The Mathematics of Information Coding, Extraction and Distribution:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer New York
1999
|
Schriftenreihe: | The IMA Volumes in Mathematics and its Applications
107 |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | High performance computing consumes and generates vast amounts of data, and the storage, retrieval, and transmission of this data are major obstacles to effective use of computing power. Challenges inherent in all of these operations are security, speed, reliability, authentication and reproducibility. This workshop focused on a wide variety of technical results aimed at meeting these challenges. Topics ranging from the mathematics of coding theory to the practicalities of copyright preservation for Internet resources drew spirited discussion and interaction among experts in diverse but related fields. We hope this volume contributes to continuing this dialogue |
Beschreibung: | 1 Online-Ressource (IX, 137 p) |
ISBN: | 9781461215240 9781461271789 |
ISSN: | 0940-6573 |
DOI: | 10.1007/978-1-4612-1524-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042419850 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150317s1999 |||| o||u| ||||||eng d | ||
020 | |a 9781461215240 |c Online |9 978-1-4612-1524-0 | ||
020 | |a 9781461271789 |c Print |9 978-1-4612-7178-9 | ||
024 | 7 | |a 10.1007/978-1-4612-1524-0 |2 doi | |
035 | |a (OCoLC)863668724 | ||
035 | |a (DE-599)BVBBV042419850 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-703 |a DE-91 |a DE-634 | ||
082 | 0 | |a 519 |2 23 | |
084 | |a MAT 000 |2 stub | ||
100 | 1 | |a Cybenko, George |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Mathematics of Information Coding, Extraction and Distribution |c edited by George Cybenko, Dianne P. O’Leary, Jorma Rissanen |
264 | 1 | |a New York, NY |b Springer New York |c 1999 | |
300 | |a 1 Online-Ressource (IX, 137 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a The IMA Volumes in Mathematics and its Applications |v 107 |x 0940-6573 | |
500 | |a High performance computing consumes and generates vast amounts of data, and the storage, retrieval, and transmission of this data are major obstacles to effective use of computing power. Challenges inherent in all of these operations are security, speed, reliability, authentication and reproducibility. This workshop focused on a wide variety of technical results aimed at meeting these challenges. Topics ranging from the mathematics of coding theory to the practicalities of copyright preservation for Internet resources drew spirited discussion and interaction among experts in diverse but related fields. We hope this volume contributes to continuing this dialogue | ||
650 | 4 | |a Mathematics | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Applications of Mathematics | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Mathematik | |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hochgeschwindigkeitsnetz |0 (DE-588)4315403-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschutz |0 (DE-588)4131649-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information Retrieval |0 (DE-588)4072803-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenkompression |0 (DE-588)4121121-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Codierungstheorie |0 (DE-588)4139405-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstheorie |0 (DE-588)4026927-9 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)1071861417 |a Konferenzschrift |y 1996 |z College Park Md. |2 gnd-content | |
655 | 7 | |8 2\p |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | |8 3\p |5 DE-604 | |
689 | 1 | 0 | |a Hochgeschwindigkeitsnetz |0 (DE-588)4315403-7 |D s |
689 | 1 | 1 | |a Information Retrieval |0 (DE-588)4072803-1 |D s |
689 | 1 | |8 4\p |5 DE-604 | |
689 | 2 | 0 | |a Codierungstheorie |0 (DE-588)4139405-7 |D s |
689 | 2 | |8 5\p |5 DE-604 | |
689 | 3 | 0 | |a Informationstheorie |0 (DE-588)4026927-9 |D s |
689 | 3 | |8 6\p |5 DE-604 | |
689 | 4 | 0 | |a Softwareschutz |0 (DE-588)4131649-6 |D s |
689 | 4 | |8 7\p |5 DE-604 | |
689 | 5 | 0 | |a Datenkompression |0 (DE-588)4121121-2 |D s |
689 | 5 | |8 8\p |5 DE-604 | |
700 | 1 | |a O’Leary, Dianne P. |e Sonstige |4 oth | |
700 | 1 | |a Rissanen, Jorma |e Sonstige |4 oth | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4612-1524-0 |x Verlag |3 Volltext |
912 | |a ZDB-2-SMA |a ZDB-2-BAE | ||
940 | 1 | |q ZDB-2-SMA_Archive | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027855267 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 5\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 6\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 7\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 8\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804153090987786240 |
---|---|
any_adam_object | |
author | Cybenko, George |
author_facet | Cybenko, George |
author_role | aut |
author_sort | Cybenko, George |
author_variant | g c gc |
building | Verbundindex |
bvnumber | BV042419850 |
classification_tum | MAT 000 |
collection | ZDB-2-SMA ZDB-2-BAE |
ctrlnum | (OCoLC)863668724 (DE-599)BVBBV042419850 |
dewey-full | 519 |
dewey-hundreds | 500 - Natural sciences and mathematics |
dewey-ones | 519 - Probabilities and applied mathematics |
dewey-raw | 519 |
dewey-search | 519 |
dewey-sort | 3519 |
dewey-tens | 510 - Mathematics |
discipline | Mathematik |
doi_str_mv | 10.1007/978-1-4612-1524-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04322nmm a2200853zcb4500</leader><controlfield tag="001">BV042419850</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150317s1999 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461215240</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4612-1524-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461271789</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-4612-7178-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4612-1524-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)863668724</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042419850</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">519</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cybenko, George</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Mathematics of Information Coding, Extraction and Distribution</subfield><subfield code="c">edited by George Cybenko, Dianne P. O’Leary, Jorma Rissanen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer New York</subfield><subfield code="c">1999</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (IX, 137 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The IMA Volumes in Mathematics and its Applications</subfield><subfield code="v">107</subfield><subfield code="x">0940-6573</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">High performance computing consumes and generates vast amounts of data, and the storage, retrieval, and transmission of this data are major obstacles to effective use of computing power. Challenges inherent in all of these operations are security, speed, reliability, authentication and reproducibility. This workshop focused on a wide variety of technical results aimed at meeting these challenges. Topics ranging from the mathematics of coding theory to the practicalities of copyright preservation for Internet resources drew spirited discussion and interaction among experts in diverse but related fields. We hope this volume contributes to continuing this dialogue</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applications of Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hochgeschwindigkeitsnetz</subfield><subfield code="0">(DE-588)4315403-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information Retrieval</subfield><subfield code="0">(DE-588)4072803-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenkompression</subfield><subfield code="0">(DE-588)4121121-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">1996</subfield><subfield code="z">College Park Md.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">2\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Hochgeschwindigkeitsnetz</subfield><subfield code="0">(DE-588)4315403-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Information Retrieval</subfield><subfield code="0">(DE-588)4072803-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">5\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">6\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">7\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Datenkompression</subfield><subfield code="0">(DE-588)4121121-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">8\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">O’Leary, Dianne P.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rissanen, Jorma</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4612-1524-0</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SMA</subfield><subfield code="a">ZDB-2-BAE</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SMA_Archive</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027855267</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">5\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">6\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">7\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">8\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)1071861417 Konferenzschrift 1996 College Park Md. gnd-content 2\p (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift 1996 College Park Md. Konferenzschrift |
id | DE-604.BV042419850 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:21:05Z |
institution | BVB |
isbn | 9781461215240 9781461271789 |
issn | 0940-6573 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027855267 |
oclc_num | 863668724 |
open_access_boolean | |
owner | DE-384 DE-703 DE-91 DE-BY-TUM DE-634 |
owner_facet | DE-384 DE-703 DE-91 DE-BY-TUM DE-634 |
physical | 1 Online-Ressource (IX, 137 p) |
psigel | ZDB-2-SMA ZDB-2-BAE ZDB-2-SMA_Archive |
publishDate | 1999 |
publishDateSearch | 1999 |
publishDateSort | 1999 |
publisher | Springer New York |
record_format | marc |
series2 | The IMA Volumes in Mathematics and its Applications |
spelling | Cybenko, George Verfasser aut The Mathematics of Information Coding, Extraction and Distribution edited by George Cybenko, Dianne P. O’Leary, Jorma Rissanen New York, NY Springer New York 1999 1 Online-Ressource (IX, 137 p) txt rdacontent c rdamedia cr rdacarrier The IMA Volumes in Mathematics and its Applications 107 0940-6573 High performance computing consumes and generates vast amounts of data, and the storage, retrieval, and transmission of this data are major obstacles to effective use of computing power. Challenges inherent in all of these operations are security, speed, reliability, authentication and reproducibility. This workshop focused on a wide variety of technical results aimed at meeting these challenges. Topics ranging from the mathematics of coding theory to the practicalities of copyright preservation for Internet resources drew spirited discussion and interaction among experts in diverse but related fields. We hope this volume contributes to continuing this dialogue Mathematics Coding theory Applications of Mathematics Coding and Information Theory Mathematik Authentifikation (DE-588)4330656-1 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Hochgeschwindigkeitsnetz (DE-588)4315403-7 gnd rswk-swf Softwareschutz (DE-588)4131649-6 gnd rswk-swf Information Retrieval (DE-588)4072803-1 gnd rswk-swf Datenkompression (DE-588)4121121-2 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Codierungstheorie (DE-588)4139405-7 gnd rswk-swf Informationstheorie (DE-588)4026927-9 gnd rswk-swf 1\p (DE-588)1071861417 Konferenzschrift 1996 College Park Md. gnd-content 2\p (DE-588)1071861417 Konferenzschrift gnd-content Internet (DE-588)4308416-3 s Datenschutz (DE-588)4011134-9 s Authentifikation (DE-588)4330656-1 s 3\p DE-604 Hochgeschwindigkeitsnetz (DE-588)4315403-7 s Information Retrieval (DE-588)4072803-1 s 4\p DE-604 Codierungstheorie (DE-588)4139405-7 s 5\p DE-604 Informationstheorie (DE-588)4026927-9 s 6\p DE-604 Softwareschutz (DE-588)4131649-6 s 7\p DE-604 Datenkompression (DE-588)4121121-2 s 8\p DE-604 O’Leary, Dianne P. Sonstige oth Rissanen, Jorma Sonstige oth https://doi.org/10.1007/978-1-4612-1524-0 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 5\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 6\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 7\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 8\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cybenko, George The Mathematics of Information Coding, Extraction and Distribution Mathematics Coding theory Applications of Mathematics Coding and Information Theory Mathematik Authentifikation (DE-588)4330656-1 gnd Internet (DE-588)4308416-3 gnd Hochgeschwindigkeitsnetz (DE-588)4315403-7 gnd Softwareschutz (DE-588)4131649-6 gnd Information Retrieval (DE-588)4072803-1 gnd Datenkompression (DE-588)4121121-2 gnd Datenschutz (DE-588)4011134-9 gnd Codierungstheorie (DE-588)4139405-7 gnd Informationstheorie (DE-588)4026927-9 gnd |
subject_GND | (DE-588)4330656-1 (DE-588)4308416-3 (DE-588)4315403-7 (DE-588)4131649-6 (DE-588)4072803-1 (DE-588)4121121-2 (DE-588)4011134-9 (DE-588)4139405-7 (DE-588)4026927-9 (DE-588)1071861417 |
title | The Mathematics of Information Coding, Extraction and Distribution |
title_auth | The Mathematics of Information Coding, Extraction and Distribution |
title_exact_search | The Mathematics of Information Coding, Extraction and Distribution |
title_full | The Mathematics of Information Coding, Extraction and Distribution edited by George Cybenko, Dianne P. O’Leary, Jorma Rissanen |
title_fullStr | The Mathematics of Information Coding, Extraction and Distribution edited by George Cybenko, Dianne P. O’Leary, Jorma Rissanen |
title_full_unstemmed | The Mathematics of Information Coding, Extraction and Distribution edited by George Cybenko, Dianne P. O’Leary, Jorma Rissanen |
title_short | The Mathematics of Information Coding, Extraction and Distribution |
title_sort | the mathematics of information coding extraction and distribution |
topic | Mathematics Coding theory Applications of Mathematics Coding and Information Theory Mathematik Authentifikation (DE-588)4330656-1 gnd Internet (DE-588)4308416-3 gnd Hochgeschwindigkeitsnetz (DE-588)4315403-7 gnd Softwareschutz (DE-588)4131649-6 gnd Information Retrieval (DE-588)4072803-1 gnd Datenkompression (DE-588)4121121-2 gnd Datenschutz (DE-588)4011134-9 gnd Codierungstheorie (DE-588)4139405-7 gnd Informationstheorie (DE-588)4026927-9 gnd |
topic_facet | Mathematics Coding theory Applications of Mathematics Coding and Information Theory Mathematik Authentifikation Internet Hochgeschwindigkeitsnetz Softwareschutz Information Retrieval Datenkompression Datenschutz Codierungstheorie Informationstheorie Konferenzschrift 1996 College Park Md. Konferenzschrift |
url | https://doi.org/10.1007/978-1-4612-1524-0 |
work_keys_str_mv | AT cybenkogeorge themathematicsofinformationcodingextractionanddistribution AT olearydiannep themathematicsofinformationcodingextractionanddistribution AT rissanenjorma themathematicsofinformationcodingextractionanddistribution |