Fundamentals in information theory and coding:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXIV, 485 S. graph. Darst. 24 cm |
ISBN: | 3642203469 9783642203466 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039126465 | ||
003 | DE-604 | ||
005 | 20111122 | ||
007 | t | ||
008 | 110707s2011 d||| |||| 00||| eng d | ||
016 | 7 | |a 1010478761 |2 DE-101 | |
020 | |a 3642203469 |9 3-642-20346-9 | ||
020 | |a 9783642203466 |c Pp. : EUR 139.05 (DE, freier Pr.), ca. sfr 186.50 (freier Pr.) |9 978-3-642-20346-6 | ||
035 | |a (OCoLC)725000629 | ||
035 | |a (DE-599)DNB1010478761 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-83 |a DE-706 | ||
082 | 0 | |a 005.82 |2 22/ger | |
082 | 0 | |a 621.3822 |2 22/ger | |
084 | |a ST 130 |0 (DE-625)143588: |2 rvk | ||
084 | |a 94A15 |2 msc | ||
084 | |a 004 |2 sdnb | ||
084 | |a 94Bxx |2 msc | ||
084 | |a 621.3 |2 sdnb | ||
100 | 1 | |a Borda, Monica |e Verfasser |4 aut | |
245 | 1 | 0 | |a Fundamentals in information theory and coding |c Monica Borda |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XXIV, 485 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Informationstheorie |0 (DE-588)4026927-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Codierungstheorie |0 (DE-588)4139405-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informationstheorie |0 (DE-588)4026927-9 |D s |
689 | 0 | 1 | |a Codierungstheorie |0 (DE-588)4139405-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-20347-3 |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024144903&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-024144903 |
Datensatz im Suchindex
_version_ | 1804147959604969472 |
---|---|
adam_text | IMAGE 1
CONTENTS
1 INFORMATION TRANSMISSION SYSTEMS 1
1.1 TERMINOLOGY 1
1.2 ROLE OF AN ITS 2
1.3 MODEL OF AN ITS 3
REFERENCES 5
2 STATISTICAL AND INFORMATIONAL MODEL OF AN ITS 7
2.1 MEMORYLESS INFORMATION SOURCES 7
2.2 MEASURE OF DISCRETE INFORMATION 8
2.3 INFORMATION ENTROPY FOR A DMS (SHANNON ENTROPY) 11
2.4 SOURCE REDUNDANCY AND EFFICIENCY 13
2.5 ENTROPY OF AN EXTENDED DISCRETE MEMORYLESS SOURCE: H(XN) 14 2.6
MOMENTS AND MOMENT RATE 14
2.7 INFORMATION RATE, DECISION RATE 15
2.8 DISCRETE TRANSMISSION CHANNELS 16
2.8.1 PROBABILITIES AND ENTROPIES IN DISCRETE CHANNELS 16 2.8.2 MUTUAL
INFORMATION AND TRANSINFORMATION 21
2.8.3 RELATIONSHIPS BETWEEN ENTROPIES 21
2.8.4 CHANNEL CAPACITY USING THE NOISE MATRIX 23
2.8.5 SHANNON CAPACITY 30
2.9 MEMORY SOURCES (MARKOV SOURCES) 38
2.9.1 FINITE AND HOMOGENEOUS MARKOV CHAINS 39
2.9.2 ENTROPY OF M-TH ORDER MARKOV SOURCE 43
2.9.3 APPLICATIONS 46
REFERENCES 51
3 SOURCE CODING 53
3.1 WHAT IS CODING AND WHY IS IT NECESSARY? 53
3.2 AIM OF SOURCE CODING 55
3.3 INFORMATION REPRESENTATION CODES 55
3.3.1 SHORT HISTORY 55
3.3.2 NUMERAL SYSTEMS 56
3.3.3 BINARY CODES USED IN DATA TRANSMISSION, STORAGE OR COMPUTING 58
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1010478761
DIGITALISIERT DURCH
IMAGE 2
XII CONTENTS
3.3.4 PULSE CODE MODULATION (PCM) 65
3.3.5 GENETIC CODE 76
3.4 CODING EFFICIENCY: COMPRESSION RATIO 80
3.5 EXISTENCE THEOREM FOR INSTANTANEOUS AND UNIQUELY DECODABLE CODES
(KRAFT AND MCMILLAN INEQUALITIES) 82
3.6 SHANNON FIRST THEOREM (1948) 84
3.7 LOSSELESS COMPRESSION ALGORITHMS 85
3.7.1 SHANNON-FANO BINARY CODING 85
3.7.2 HUFFMAN ALGORITHMS 88
3.7.3 RUN LENGTH CODING (RLC) 95
3.7.4 COMMA CODING 100
3.7.5 DICTIONARY TECHNIQUES [41] 101
3.7.6 LEMPEL-ZIV TYPE ALGORITHMS (LZ) 102
3.7.7 ARITHMETIC CODING 107
3.8 LOSSY COMPRESSION IN DIFFERENTIAL CODING 109
3.8.1 DIFFERENTIAL PULSE CODE MODULATION (DPCM) 109
3.8.2 DELTA MODULATION (DM) 111
3.8.3 DELTA-SIGMA MODULATION 115
3.8.4 COMPARISON AND APPLICATIONS OF DIGITAL MODULATIONS 116 3.9
CONCLUSIONS ON COMPRESSION 116
REFERENCES 118
4 CRYPTOGRAPHY BASICS 121
4.1 SHORT HISTORY OF CRYPTOGRAPHY 121
4.2 TERMINOLOGY 123
4.3 CRYPTOSYSTEMS: ROLE AND CLASSIFICATION 123
4.4 CRYPTANALYTIC ATTACKS AND ALGORITHMS SECURITY 125
4.5 CLASSIC CRYPTOGRAPHY 127
4.5.1 DEFINITION AND CLASSIFICATION 127
4.5.2 CAESAR CIPHER 128
4.5.3 POLYBIUS CIPHER 130
4.5.4 PLAYFAIR CIPHER 131
4.5.5 TRITHEMIUS CIPHER 132
4.5.6 VIGENERE CIPHER 134
4.6 MODERN SYMMETRIC (CONVENTIONAL) CRYPTOGRAPHY 135
4.6.1 DEFINITIONSAND CLASSIFICATION 135
4.6.2 BLOCK CIPHERS 137
4.6.2.1 MAIN FEATURES 137
4.6.2.2 DES (DATA ENCRYPTION STANDARD) 139
4.6.2.3 SOME OTHER BLOCK CIPHERS 147
4.6.2.4 BLOCK CIPHER OPERATION MODES 150
4.6.3 STREAM CIPHERS 153
4.6.3.1 GENERAL FEATURES 153
4.6.3.2 SOME STREAM CIPHERS 157
4.6.4 AUTHENTICATION WITH SYMMETRIC CRYPTOGRAPHY 158
IMAGE 3
CONTENTS XIII
4.7 PUBLIC KEY CRYPTOGRAPHY 159
4.7.1 PRINCIPLE OF THE PUBLIC KEY CRYPTOGRAPHY 159
4.7.2 PUBLIC KEYS CIPHERS 162
4.8 DIGITAL WATERMARKING 164
4.8.1 INTRODUCTION 164
4.8.2 SHORT HISTORY 167
4.8.3 WATERMARKING REQUIREMENTS 168
4.8.4 BASIC PRINCIPLES OF WATERMARKING 169
4.8.5 SPECIFIC ATTACKS 177
4.8.5.1 ATTACK DEFINITION AND CLASSIFICATION 177
4.8.5.2 THE INVERSION ATTACK / IBM / CONFUSION / DEADLOCK / FAKE
WATERMARK / FAKE ORIGINAL 178 4.8.5.3 THE COLLUSION ATTACK 180
4.8.6 APPLICATIONS 181
4.8.6.1 BROADCAST MONITORING 181
4.8.6.2 OWNER IDENTIFICATION: PROOF OF OWNERSHIP 182 4.8.6.3
FINGERPRINTING (TRANSACTION TRACKING) 183 4.8.6.4 CONTENT AUTHENTICATION
(FRAGILE WATERMARKING) 183 4.8.6.5 COPY CONTROL 184
4.8.7 THE MILLENNIUM WATERMARK SYSTEM [53] .184
4.8.7.1 INTRODUCTION 184
4.8.7.2 BASIC PRINCIPLE OF THE MILLENNIUM SYSTEM 185 4.8.7.3 MILLENNIUM
STANDARD IMPLEMENTATION 188 4.8.7.4 UNSOLVED PROBLEMS 188
4.8.7.5 COPY CONTROL [53] 189
4.8.7.6 MEDIA TYPE RECOGNITION 189
4.8.8 SOME REMARKS 189
4.9 DNA CRYPTOGRAPHY 190
4.9.1 INTRODUCTION 190
4.9.2 BACKGROUNDS OF BIOMOLECULAR TECHNOLOGIES 190
4.9.3 ELEMENTS OF BIOMOLECULAR COMPUTATION (BMC) 194 4.9.3.1 DNA OTP
GENERATION 194
4.9.3.2 CONVERSION OF BINARY DATA TO DNA FORMAT AND VICE VERSA 194
4.9.3.3 DNA TILES AND XOR WITH DNA TILES 195
4.9.4 DNA BASED STEGANOGRAPHY AND CRYPTOGRAPHIC ALGORITHMS 197 4.9.4.1
STEGANOGRAPHY TECHNIQUE USING DNA HYBRIDIZATION... 197 4.9.4.2
CHROMOSOME DNA INDEXING ALGORITHM 199 4.9.4.3 DNA XOR OTP USING TILES
202
REFERENCES 204
5 CHANNEL CODING 209
5.1 SHANNON SECOND THEOREM (NOISY CHANNELS CODING THEOREM) 209 5.2 ERROR
CONTROL STRATEGIES 213
IMAGE 4
XIV CONTENTS
5.3 CLASSIFICATION OF ERROR CONTROL CODES 216
5.4 REPRESENTATION OF BINARY CODE SEQUENCES 216
5.5 PARAMETERS OF DETECTING AND ERROR CORRECTING CODES 218
5.6 MAXIMUM LIKELIHOOD DECODING (MLD) 220
5.7 LINEAR BLOCK CODES 224
5.7.1 LINEAR BLOCK CODES: DEFINITION AND MATRIX DESCRIPTION 224 5.7.2
ERROR SYNDROME 227
5.7.3 DIMENSIONING OF ERROR CORRECTING LINEAR BLOCK CODES 228 5.7.4
PERFECT AND ALMOST PERFECT CODES 228
5.7.5 DETECTION AND CORRECTION CAPACITY: DECODED BER 229 5.7.6 RELATIONS
BETWEEN THE COLUMNS OF H MATRIX FOR ERROR DETECTION AND CORRECTION 230
5.7.7 STANDARD ARRAY AND SYNDROME DECODING 232
5.7.8 COMPARISON BETWEEN LINEAR ERROR DETECTING AND CORRECTING BLOCK
CODES 235
5.7.9 HAMMING GROUP CODES 238
5.7.10 SOME OTHER LINEAR BLOCK CODES 253
5.8 CYCLIC CODES 255
5.8.1 DEFINITION AND REPRESENTATION 256
5.8.2 ALGEBRAIC ENCODING OF CYCLIC CODES 257
5.8.3 SYNDROME CALCULATION AND ERROR DETECTION 265
5.8.4 ALGEBRAIC DECODING OF CYCLIC CODES 269
5.8.5 CIRCUITS FOR CYCLIC ENCODING AND DECODING 274
5.8.6 CYCLIC ONE ERROR CORRECTING HAMMING CODE 286
5.8.7 GOLAY CODE 290
5.8.8 FIRE CODES 292
5.8.9 REED-SOLOMON CODES 295
5.9 CONVOLUTIONAL CODES 312
5.9.1 REPRESENTATION AND PROPERTIES 312
5.9.2 CONVOLUTIONAL CODES ENCODING 314
5.9.3 GRAPHIC REPRESENTATION OF CONVOLUTIONAL CODES 320 5.9.4 CODE
DISTANCE AND D OO 324
5.9.5 DECODING (VITERBI ALGORITHM, THRESHOLD DECODING) 326 5.10 CODE
INTERLEAVING AND CONCATENATION 340
5.10.1 INTERLEAVING 340
5.10.2 CONCATENATED CODES 342
5.11 TURBO CODES 346
5.11.1 DEFINITION AND ENCODING 346
5.11.2 DECODING 348
5.11.2.1 BASIC PRINCIPLES 348
5.11.2.2 VITERBI ALGORITHM (VA) [46], [48] 349
5.11.2.3 BIDIRECTIONAL SOFT OUTPUT VITERBI ALGORITHM (SOVA)[46] 357
5.11.2.4 MAP ALGORITHM 364
5.11.2.5 MAX-LOG-MAP ALGORITHM 372
IMAGE 5
CONTENTS XV
5.11.2.6 LOG-MAP ALGORITHM 373
5.11.2.7 COMPARISON OF DECODING ALGORITHMS 374
5.12 LINE (BASEBAND) CODES 374
REFERENCES 385
APPENDIX A: ALGEBRA ELEMENTS 389
AL COMPOSITION LAWS 389
A L .L COMPOSITIONS LAW ELEMENTS 389
A1.2 STABLE PART 389
A1.3 PROPERTIES 389
A2 MODULAR ARITHMETIC 391
A3 ALGEBRAIC STRUCTURES 392
A3.1 GROUP 392
A3.2 FIELD 393
A3.3 GALOIS FIELD 393
A.3.3.1 FIELD CHARACTERISTIC 394
A.3.3.2 ORDER OF AN ELEMENT 395
A4 ARITHMETICS OF BINARY FIELDS 395
A5 CONSTRUCTION OF GALOIS FIELDS GF(2 M ) 398
A6 BASIC PROPERTIES OF GALOIS FIELDS, GF(2 M ) 402
A7 MATRICES AND LINEAR EQUATION SYSTEMS 410
A8 VECTOR SPACES 412
A8.1 DEFINING VECTOR SPACE 412
A8.2 LINEAR DEPENDENCY AND INDEPENDENCY 413
A8.3 VECTOR SPACE 414
A9 TABLE FOR PRIMITIVE POLYNOMIALS OF DEGREE K (K MAX = 100) 417
A10 REPRESENTATIVE TABLES FOR GALOIS FIELDS GF(2 K ) 418
AL 1 TABLES OF THE GENERATOR POLYNOMIALS FOR BCH CODES 420
A12 TABLE OF THE GENERATOR POLYNOMIALS FOR RS CODES 421
APPENDIX B: TABLES FOR INFORMATION AND ENTROPY COMPUTING 427 B1 TABLE
FOR COMPUTING VALUES OF -IOG 2 (X), 0.01 X 0.99 427
B2 TABLE FOR COMPUTING VALUES OF -X-LOG 2 (X), 0.001 X 0.999 428
APPENDIX C: SIGNAL DETECTION ELEMENTS 435
C.I DETECTION PROBLEM 435
C.2 SIGNAL DETECTION CRITERIA 438
C.2.1 BAYES CRITERION 438
C.2.2 MINIMUM PROBABILITY OF ERROR CRITERION (KOTELNIKOV-SIEGELT) 440
C.2.3 MAXIMUM A POSTERIORI PROBABILITY CRITERION (MAP) 441 C.2.4 MAXIMUM
LIKELIHOOD CRITERION (R. FISHER) 441
C.3 SIGNAL DETECTION IN DATA PROCESSING (K = 1) 442
C.3.1 DISCRETE DETECTION OF A UNIPOLAR SIGNAL 442
C.3.2 DISCRETE DETECTION OF POLAR SIGNAL 446
IMAGE 6
XVI CONTENTS
C.3.3 CONTINUOUS DETECTION OF KNOWN SIGNAL 448
C.3.4 CONTINUOUS DETECTION OF TWO KNOWN SIGNALS 453
REFERENCES 459
APPENDIX D: SYNTHESIS EXAMPLE 461
SUBJECT INDEX 475
ACRONYMS 483
|
any_adam_object | 1 |
author | Borda, Monica |
author_facet | Borda, Monica |
author_role | aut |
author_sort | Borda, Monica |
author_variant | m b mb |
building | Verbundindex |
bvnumber | BV039126465 |
classification_rvk | ST 130 |
ctrlnum | (OCoLC)725000629 (DE-599)DNB1010478761 |
dewey-full | 005.82 621.3822 |
dewey-hundreds | 000 - Computer science, information, general works 600 - Technology (Applied sciences) |
dewey-ones | 005 - Computer programming, programs, data, security 621 - Applied physics |
dewey-raw | 005.82 621.3822 |
dewey-search | 005.82 621.3822 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works 620 - Engineering and allied operations |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01817nam a2200481 c 4500</leader><controlfield tag="001">BV039126465</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20111122 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110707s2011 d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1010478761</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642203469</subfield><subfield code="9">3-642-20346-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642203466</subfield><subfield code="c">Pp. : EUR 139.05 (DE, freier Pr.), ca. sfr 186.50 (freier Pr.)</subfield><subfield code="9">978-3-642-20346-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)725000629</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1010478761</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.3822</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 130</subfield><subfield code="0">(DE-625)143588:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94A15</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94Bxx</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">621.3</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Borda, Monica</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fundamentals in information theory and coding</subfield><subfield code="c">Monica Borda</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 485 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-20347-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024144903&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024144903</subfield></datafield></record></collection> |
id | DE-604.BV039126465 |
illustrated | Illustrated |
indexdate | 2024-07-09T23:59:32Z |
institution | BVB |
isbn | 3642203469 9783642203466 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024144903 |
oclc_num | 725000629 |
open_access_boolean | |
owner | DE-83 DE-706 |
owner_facet | DE-83 DE-706 |
physical | XXIV, 485 S. graph. Darst. 24 cm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
spelling | Borda, Monica Verfasser aut Fundamentals in information theory and coding Monica Borda Berlin [u.a.] Springer 2011 XXIV, 485 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Informationstheorie (DE-588)4026927-9 gnd rswk-swf Codierungstheorie (DE-588)4139405-7 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Informationstheorie (DE-588)4026927-9 s Codierungstheorie (DE-588)4139405-7 s DE-604 Kryptologie (DE-588)4033329-2 s Erscheint auch als Online-Ausgabe 978-3-642-20347-3 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024144903&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Borda, Monica Fundamentals in information theory and coding Informationstheorie (DE-588)4026927-9 gnd Codierungstheorie (DE-588)4139405-7 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4026927-9 (DE-588)4139405-7 (DE-588)4033329-2 |
title | Fundamentals in information theory and coding |
title_auth | Fundamentals in information theory and coding |
title_exact_search | Fundamentals in information theory and coding |
title_full | Fundamentals in information theory and coding Monica Borda |
title_fullStr | Fundamentals in information theory and coding Monica Borda |
title_full_unstemmed | Fundamentals in information theory and coding Monica Borda |
title_short | Fundamentals in information theory and coding |
title_sort | fundamentals in information theory and coding |
topic | Informationstheorie (DE-588)4026927-9 gnd Codierungstheorie (DE-588)4139405-7 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Informationstheorie Codierungstheorie Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024144903&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT bordamonica fundamentalsininformationtheoryandcoding |