The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- De Gruyter Oldenbourg 2013; US$ 1,120.00
dieses Buch stellt die wichtigsten mathematischen Abhandlungen beim Einsatz von linearen Codes in der industriellen Kommunikation vor. Ausführlich werden effiziente Verfahren für die Approximation der Restfehlerwahrscheinlichkeit RW behandelt, die mäßig bis extrem hohen Aufwand erfordern. Insbesondere wird auch der Ansatz der Taylorreihe vorgestellt,... more...
- Taylor and Francis 2013; US$ 79.95
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret... more...
- World Scientific Publishing Company 2013; US$ 75.00
This volume mainly summarizes the invited talks presented at the 5th Asia-Pacific Workshop on Quantum Information Science (APWQIS) in conjunction with a Festschrift in honor of Professor Vladimir Korepin's 60th birthday. In this Festschrift, we have assembled a medley of interesting articles from some of his friends, well-wishers and collaborators.... more...
- Springer 2013; US$ 39.95
This SpringerBrief proposes a general framework for reasoning about inconsistency in a wide variety of logics, including inconsistency resolution methods that have not yet been studied. The proposed framework allows users to specify preferences on how to resolve inconsistency when there are multiple ways to do so. This empowers users to resolve... more...
- Springer 2013; US$ 259.00
Numerical and computational methods are nowadays used in a wide range of contexts in complex systems research, biology, physics, and engineering. Over the last decades different methodological schools have emerged with emphasis on different aspects of computation, such as nature-inspired algorithms, set oriented numerics, probabilistic systems... more...
- Springer 2013; US$ 89.95
Introduction to the Theory of Quantum Information Processing provides the material for a one-semester graduate level course on quantum information theory and quantum computing for students who have had a one-year graduate course in quantum mechanics. Many standard subjects are treated, such as density matrices, entanglement, quantum maps, quantum cryptography,... more...
- World Scientific Publishing Company 2012; US$ 140.00
Algebraic & geometry methods have constituted a basic background and tool for people working on classic block coding theory and cryptography. Nowadays, new paradigms on coding theory and cryptography have arisen such as: Network coding, S-Boxes, APN Functions, Steganography and decoding by linear programming. Again understanding the underlying procedure... more...
- Taylor and Francis 2012; US$ 93.95
Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each... more...
- Taylor and Francis 2012; US$ 125.95
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries... more...
- IOS Press 2011; US$ 131.00
The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential... more...