# The Leading eBooks Store Online

## 3,667,858 members ⚫ 1,180,414 ebooks

#### Turbo-like Codes

Springer Netherlands 2007; US$ 123.54The common property among turbo-like code is that they consist of very simple constituent codes that are connected to each other with random or pseudorandom interleavers. The crucial novelty in these codes is the iterative decoding. This means that the constituent codes are decoded separately, which is ef?cient and practically feasible since they are... more...

#### Foundations of Coding

Wiley 2011; US$ 245.00 US$ 212.33Although devoted to constructions of good codes for error control, secrecy or data compression, the emphasis is on the first direction. Introduces a number of important classes of error-detecting and error-correcting codes as well as their decoding methods. Background material on modern algebra is presented where required. The role of error-correcting... more...

#### Forward Error Correction Based On Algebraic-Geometric Theory

Springer International Publishing 2014; US$ 48.29This book covers the design, construction, and implementation of algebraic-geometric codes from Hermitian curves. Matlab simulations of algebraic-geometric codes and Reed-Solomon codes compare their bit error rate using different modulation schemes over additive white Gaussian noise channel model. Simulation results of Algebraic-geometric codes bit... more...

#### Computer Viruses and Malware

Springer US 2006; US$ 134.77Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and... more...

#### Code Biology

Springer International Publishing 2015; US$ 112.31This book is the study of all codes of life with the standard methods of science. The genetic code and the codes of culture have been known for a long time and represent the historical foundation of this book. What is really new in this field is the study of all codes that came after the genetic code and before the codes of culture. The existence... more...

#### The Codes of Life

Springer Netherlands 2007; US$ 245.98Building on a range of disciplines ? from biology and anthropology to philosophy and linguistics ? this book draws on the expertise of leading names in the study of organic, mental and cultural codes brought together by the emerging discipline of biosemiotics. The book?s 18 chapters present a range of experimental evidence which suggests that the... more...

#### A Course in Mathematical Cryptography

De Gruyter 2015; US$ 56.10The subject of this book is mathematical cryptography. By this we mean the mathematics involved in cryptographic protocols. As the field has expanded, using both commutative and noncommutative algebraic objects as cryptographic platforms, a book describing and explaining all these mathematical methods is of immeasurable value. more...

#### Optimal Time-Domain Noise Reduction Filters

Springer Berlin Heidelberg 2011; US$ 39.95This book offers a general framework in the time domain for single and multiple microphone cases, from which to derive, study and analyze optimal noise reduction filters. All known algorithms can be deduced from this approach, and new ones discovered as well. more...

#### Introduction to the Theory of Quantum Information Processing

Springer New York 2013; US$ 67.38This course-tested book offers a consistent approach to the field, based on underlying fundamental principles of quantum theory, such as quantum measurements, no-cloning and no-signaling theorems and their consequences. Includes problems of varying difficulty. more...

#### Codes: An Introduction to Information Communication and Cryptography

Springer London 2008; US$ 33.69This book is an integrated introduction to the mathematics of coding, that is, replacing information expressed in symbols, such as a natural language or a sequence of bits, by another message using (possibly) different symbols. There are three main reasons for doing this: economy, reliability, and security, and each is covered in detail. Only a modest... more...