Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
https://canv.ai/
The picture is generated by canv.ai

We are excited to announce that Canv.ai now features a built-in translator, allowing you to communicate in your native language. You can write prompts in your language, and they will be automatically translated into English, facilitating communication and the exchange of ideas!

We value freedom of speech and guarantee the absence of censorship on Canv.ai. At the same time, we hope and believe in the high moral standards of our users, which will help maintain a respectful and constructive atmosphere.


👉 Check for yourself!

Autonomic Computing and Networking (Repost)

Posted By: AvaxGenius
Autonomic Computing and Networking (Repost)

Autonomic Computing and Networking by Yan Zhang, Laurence Tianruo Yang, Mieso K. Denko
English | PDF | 2009 | 462 Pages | ISBN : 0387898271 | 7.1 MB

Autonomic Computing and Networking presents introductory and advanced topics on autonomic computing and networking with emphasis on architectures, protocols, services, privacy & security, simulation and implementation testbeds. Autonomic computing and networking are new computing and networking paradigms that allow the creation of self-managing and self-controlling computing and networking environments using techniques such as distributed algorithms and context-awareness to dynamically control networking functions without human interventions. Autonomic networking is characterized by recovery from failures and malfunctions, agility to changing networking environment, self-optimization and self-awareness. The self-control and management features can help to overcome the growing complexity and heterogeneity of exiting communication networks and systems. The realization of fully autonomic heterogeneous networking introduces several research challenges in all aspects of computing and networking and related fields.

Analysis of Computer and Communication Networks

Posted By: AvaxGenius
Analysis of Computer and Communication Networks

Analysis of Computer and Communication Networks by Fayez Gebali
English | PDF (True) | 2008 | 685 Pages | ISBN : 0387744363 | 7.9 MB

The purpose of this book is to give the reader two things, to paraphrase Mark Twain: Roots to know the basics of modeling networks and Wings to fly away and attempt modeling other proposed systems of interest. The Internet phenomenon is affecting us all in the way we communicate, conduct business, and access information and entertainment. More unforeseen applications are still to come. All of this is due to the existence of an efficient global hi- performance network that connects millions of users and moves information at a high rate with small delay.

Information Theory and Network Coding

Posted By: AvaxGenius
Information Theory and Network Coding

Information Theory and Network Coding by Raymond W. Yeung
English | PDF (True) | 2008 | 592 Pages | ISBN : 0387792333 | 9.3 MB

This book is an evolution from my book A First Course in Information Theory published in 2002 when network coding was still at its infancy. The last few years have witnessed the rapid development of network coding into a research ?eld of its own in information science. With its root in infor- tion theory, network coding has not only brought about a paradigm shift in network communications at large, but also had signi?cant in?uence on such speci?c research ?elds as coding theory, networking, switching, wireless c- munications,distributeddatastorage,cryptography,andoptimizationtheory. While new applications of network coding keep emerging, the fundamental - sults that lay the foundation of the subject are more or less mature. One of the main goals of this book therefore is to present these results in a unifying and coherent manner. While the previous book focused only on information theory for discrete random variables, the current book contains two new chapters on information theory for continuous random variables, namely the chapter on di?erential entropy and the chapter on continuous-valued channels. With these topics included, the book becomes more comprehensive and is more suitable to be used as a textbook for a course in an electrical engineering department.

A Classical Introduction to Cryptography: Applications for Communications Security

Posted By: AvaxGenius
A Classical Introduction to Cryptography: Applications for Communications Security

A Classical Introduction to Cryptography: Applications for Communications Security by Serge Vaudenay
English | PDF (True) | 2006 | 344 Pages | ISBN : 0387254641 | 2.3 MB

A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.

Progress in Cryptology – Mycrypt 2005 (Repost)

Posted By: AvaxGenius
Progress in Cryptology – Mycrypt 2005 (Repost)

Progress in Cryptology – Mycrypt 2005: First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings by Ed Dawson, Serge Vaudenay
English | PDF (True) | 2005 | 338 Pages | ISBN : 3540289380 | 4.3 MB

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized by the Information Security - search Lab at Swinburne University of Technology (Sarawak Campus), NISER (National ICT Security and Emergency Response Centre) and INSPEM (Ins- tute for MathematicalResearch)at UPM (UniversityPutra Malaysia).Mycrypt 2005 was held in Kuala Lumpur, Malaysia during September 28-30 2005, in conjunction with the e-Secure Malaysia 2005 convention. Therewere90paper submissionsfrom23 countriescoveringall areasof cr- tologic research, from which 19 were accepted. We would like to extend our thanks to all authors who submitted papers to Mycrypt 2005.

Advances in Cryptology – EUROCRYPT 2005 (Repost)

Posted By: AvaxGenius
Advances in Cryptology – EUROCRYPT 2005 (Repost)

Advances in Cryptology – EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings by Ronald Cramer
English | PDF (True) | 2005 | 589 Pages | ISBN : 3540259104 | 5.1 MB

These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research.

Fundamentals of Computer Security

Posted By: AvaxGenius
Fundamentals of Computer Security

Fundamentals of Computer Security by Josef Pieprzyk , Thomas Hardjono , Jennifer Seberry
English | PDF | 2003 | 686 Pages | ISBN : 3540431012 | 3.9 MB

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.

Network Calculus: A Theory of Deterministic Queuing Systems for the Internet

Posted By: AvaxGenius
Network Calculus: A Theory of Deterministic Queuing Systems for the Internet

Network Calculus: A Theory of Deterministic Queuing Systems for the Internet by Jean-Yves Boudec, Patrick Thiran
English | PDF (True) | 2001 | 280 Pages | ISBN : 354042184X | 4.2 MB

Network Calculus is a set of recent developments that provide deep insights into flow problems encountered in the Internet and in intranets. The first part of the book is a self-contained, introductory course on network calculus. It presents the core of network calculus, and shows how it can be applied to the Internet to obtain results that have physical interpretations of practical importance to network engineers. The second part serves as a mathematical reference used across the book. It presents the results from Min-plus algebra needed for network calculus. The third part contains more advanced material. It is appropriate reading for a graduate course and a source of reference for professionals in networking by surveying the state of the art of research and pointing to open problems in network calculus and its application in different fields, such as mulitmedia smoothing, aggegate scheduling, adaptive guarantees in Internet differential services, renegotiated reserved services, etc.

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

Posted By: AvaxGenius
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint by David J. Marchette
English | PDF | 2001 | 339 Pages | ISBN : 0387952810 | 29 MB

In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection.

Turbo Codes: Principles and Applications

Posted By: AvaxGenius
Turbo Codes: Principles and Applications

Turbo Codes: Principles and Applications by Branka Vucetic , Jinhong Yuan
English | PDF (True) | 2000 | 330 Pages | ISBN : 0792378687 | 20.4 MB

This book grew out of our research, industry consulting and con­ tinuing education courses. Turbo coding initially seemed to belong to a restricted research area, while now has become a part of the mainstream telecommu­ nication theory and practice. The turbo decoding principles have found widespread applications not only in error control, but in de­ tection, interference suppression and equalization. Intended for use by advanced students and professional engi­ neers, involved in coding and telecommunication research, the book includes both basic and advanced material. The chapters are se­ quenced so that the knowledge is acquired in a logical and progres­ sive way. The algorithm descriptions and analysis are supported by examples throughout the book. Performance evaluations of the presented algorithms are carried out both analytically and by sim­ ulations. Basic material included in the book has been taught to students and practicing professionals over the last four years in the form of senior undergraduate or graduate courses, lecture series and short continuing education courses.

Advances in Real-Time Systems

Posted By: AvaxGenius
Advances in Real-Time Systems

Advances in Real-Time Systems by Samarjit Chakraborty, Jörg Eberspächer
English | PDF | 2012 | 353 Pages | ISBN : 3642243487 | 8.2 MB

This volume contains the lectures given in honor to Georg Färber as tribute to his contributions in the area of real-time and embedded systems. The chapters of many leading scientists cover a wide range of aspects, like robot or automotive vision systems or medical aspects.

Handbook of Real-Time Computing (Repost)

Posted By: AvaxGenius
Handbook of Real-Time Computing (Repost)

Handbook of Real-Time Computing by Yu-Chu Tian, David Charles Levy
English | PDF EPUB (True) | 2022 | 1511 Pages | ISBN : 9812872507 | 164.5 MB

The aim of this handbook is to summarize the recent rapidly developed real-time computing technologies, from theories to applications. This handbook benefits the readers as a full and quick technical reference with a high-level historic review of technology, detailed technical descriptions and the latest practical applications. In general, the handbook is divided into three main parts (subjected to be modified): theory, design, and application covering different but not limited to the following topics:

Systematic Design of Sigma-Delta Analog-to-Digital Converters

Posted By: AvaxGenius
Systematic Design of Sigma-Delta Analog-to-Digital Converters

Systematic Design of Sigma-Delta Analog-to-Digital Converters by Ovidiu Bajdechi , Johan H. Huijsing
English | PDF | 2004 | 203 Pages | ISBN : 1402079451 | 17.6 MB

Systematic Design of Sigma-Delta Analog-to-Digital Converters describes the issues related to the sigma-delta analog-to-digital converters (ADCs) design in a systematic manner: from the top level of abstraction represented by the filters defining signal and noise transfer functions (STF, NTF), passing through the architecture level where topology-related performance is calculated and simulated, and finally down to parameters of circuit elements like resistors, capacitors, and amplifier transconductances used in individual integrators. The systematic approach allows the evaluation of different loop filters (order, aggressiveness, discrete-time or continuous-time implementation) with quantizers varying in resolution. Topologies explored range from simple single loops to multiple cascaded loops with complex structures including more feedbacks and feedforwards. For differential circuits, with switched-capacitor integrators for discrete-time (DT) loop filters and active-RC for continuous-time (CT) ones, the passive integrator components are calculated and the power consumption is estimated, based on top-level requirements like harmonic distortion and noise budget.

Privacy, Security and Trust within the Context of Pervasive Computing (Repost)

Posted By: AvaxGenius
Privacy, Security and Trust within the Context of Pervasive Computing (Repost)

Privacy, Security and Trust within the Context of Pervasive Computing by Philip Robinson, Harald Vogt, Waleed Wagealla
English | PDF | 2005 | 167 Pages | ISBN : 0387234616 | 9 MB

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria.The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic" problems, leading to a more complete understanding of the social and technical issues in pervasive computing.

Cognitive Computation and Systems

Posted By: AvaxGenius
Cognitive Computation and Systems

Cognitive Computation and Systems: Second International Conference, ICCCS 2023, Urumqi, China, October 14–15, 2023, Revised Selected Papers by Fuchun Sun, Jianmin Li
English | PDF (True) | 2024 | 343 Pages | ISBN : 9819708842 | 34 MB

This book constitutes the refereed proceedings of the Second International Conference on Cognitive Computation and Systems, ICCCS 2023, held in Urumqi, China, October 14–15, 2023.The 26 full papers included in the book were carefully reviewed and selected from 68 submissions. ICCCS aims to bring together experts from different expertise areas to discuss the state-of-the-art in cognitive computing and intelligent systems, and to present new research results and perspectives on future development. They were organized in topical sections as follows: Perception and learning and decision making and systems.