This book constitutes the proceedings of the Third International Conference on information Theoretic Security, held in Calgary, Canada, in August 2008. The 14 papers presented in this volume were carefully reviewed an...
详细信息
ISBN:
(数字)9783540850939
ISBN:
(纸本)9783540850922
This book constitutes the proceedings of the Third International Conference on information Theoretic Security, held in Calgary, Canada, in August 2008.
The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions. There were nine invited speeches to the conference. The topics covered are secure and reliable communication; quantum information and communication; networks and devices; multiparty computation; information hiding and tracing; codingtheory and security; quantum computation; foundation; and encryption.
How can one exchange information e?ectively when the medium of com- nication introduces errors? This question has been investigated extensively starting with the seminal works of Shannon (1948) and Hamming (1950), and...
详细信息
ISBN:
(数字)9783540301806
ISBN:
(纸本)9783540240518
How can one exchange information e?ectively when the medium of com- nication introduces errors? This question has been investigated extensively starting with the seminal works of Shannon (1948) and Hamming (1950), and has led to the rich theory of “error-correcting codes”. This theory has traditionally gone hand in hand with the algorithmic theory of “decoding” that tackles the problem of recovering from the errors e?ciently. This thesis presents some spectacular new results in the area of decoding algorithms for error-correctingcodes. Speci?cally,itshowshowthenotionof“list-decoding” can be applied to recover from far more errors, for a wide variety of err- correcting codes, than achievable before. A brief bit of background: error-correcting codes are combinatorial str- tures that show how to represent (or “encode”) information so that it is - silient to a moderate number of errors. Speci?cally, an error-correcting code takes a short binary string, called the message, and shows how to transform it into a longer binary string, called the codeword, so that if a small number of bits of the codewordare ?ipped, the resulting string does not look like any other codeword. The maximum number of errorsthat the code is guaranteed to detect, denoted d, is a central parameter in its design. A basic property of such a code is that if the number of errors that occur is known to be smaller than d/2, the message is determined uniquely. This poses a computational problem,calledthedecodingproblem:computethemessagefromacorrupted codeword, when the number of errors is less than d/2.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. T...
详细信息
ISBN:
(数字)9783642347047
ISBN:
(纸本)9783642347030
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.
Dieses Buch bietet neuestes Wissen zur Codierung – anwendungsnah und beispielhaft vermittelt – für Studierende und die berufliche Weiterbildung. Profitieren Sie von der verständlichen Darstellung, den ausf...
详细信息
ISBN:
(数字)9783834821546
ISBN:
(纸本)9783834816740
Dieses Buch bietet neuestes Wissen zur Codierung – anwendungsnah und beispielhaft vermittelt – für Studierende und die berufliche Weiterbildung. Profitieren Sie von der verständlichen Darstellung, den ausführlichen Beispielen und der Erfahrung, die der Autor über viele Jahre unter Beweis gestellt hat.;Für die vierte Auflage wurde das Buch grundlegend überarbeitet.
The genesis of this volume was the participation of the editors in an ACMlSIGIR (Association for Computing Machinery/Special Interest Group on information Retrieval) workshop entitled "Beyond Word Relations"...
详细信息
ISBN:
(数字)9789401700733
ISBN:
(纸本)9781402005688;9789048159963
The genesis of this volume was the participation of the editors in an ACMlSIGIR (Association for Computing Machinery/Special Interest Group on information Retrieval) workshop entitled "Beyond Word Relations" (Hetzler, 1997). This workshop examined a number of relationship types with significance for information retrieval beyond the conventional topic-matching relationship. From this shared participation came the idea for an edited volume on relationships, with chapters to be solicited from researchers and practitioners throughout the world. Ultimately, one volume became two volumes. The first volume, Relationships in the Organization of Knowledge (Bean & Green, 200 I), examines the role of relationships in knowledge organization theory and practice, with emphasis given to thesaural relationships and integration across systems, languages, cultures, and disciplines. This second volume examines relationships in a broader array of contexts. The two volumes should be seen as companions, each informing the other. As with the companion volume, we are especially grateful to the authors who willingly accepted challenges of space and time to produce chapters that summarize extensive bodies of research. The value of the volume clearly resides in the quality of the individual chapters. In naming this volume The Semantics of Relationships: An Interdisciplinary Perspective, we wanted to highlight the fact that relationships are not just empty connectives. Relationships constitute important conceptual units and make significant contributions to meaning.
暂无评论