This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security.
With the development of big data, data sharing has become increasingly popular and important in optimizing resource allocation and improving information utilization.
This book starts by presenting the basics of reinforcement learning using highly intuitive and easy-to-understand examples and applications, and then introduces the cutting-edge research advances that make reinforcement learning capable of out-performing most state-of-art systems, and even humans in a number of applications.
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes.
Since the publication of the first edition of this monograph, a generalisation of the Assmus-Mattson theorem for linear codes over finite fields has been developed, two 70-year breakthroughs and a considerable amount of other progress on t-designs from linear codes have been made.
There are connections between invariant theory and modular forms since the times of Felix Klein, in the 19th century, connections between codes and lattices since the 1960's.
This book presents state-of-the-art methodologies and a comprehensive introduction to the recognition and representation of species and individual animals based on their physiological and phenotypic appearances, biometric characteristics, and morphological image patterns.
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.
This book grew out of our lectures given in the Oberseminar on 'Cod- ing Theory and Number Theory' at the Mathematics Institute of the Wiirzburg University in the Summer Semester, 2001.
The genesis of this volume was the participation of the editors in an ACMlSIGIR (Association for Computing Machinery/Special Interest Group on Information Retrieval) workshop entitled "e;Beyond Word Relations"e; (Hetzler, 1997).
Physicists, when modelling physical systems with a large number of degrees of freedom, and statisticians, when performing data analysis, have developed their own concepts and methods for making the `best' inference.
This book contains the lectures given at the Conference on Dynamics and Randomness held at the Centro de Modelamiento Matematico of the Universidad de Chile from December 11th to 15th, 2000.
The requirements for multimedia (especially video and audio) communications increase rapidly in the last two decades in broad areas such as television, entertainment, interactive services, telecommunications, conference, medicine, security, business, traffic, defense and banking.
The rapid growth of fintech services in Asia and the Pacific can help countries leapfrog the challenges of traditional financial services infrastructure and dramatically increase access to financial services.
In passato, l’arte della “scrittura nascosta” (meglio nota come crittografia) era per lo più riferita ad un insieme di metodi per nascondere il contenuto di un dato messaggio agli occhi di lettori non autorizzati.
Dalle origini a oggi, i videogiochi hanno dimostrato di aver acquisito una forte identità espressiva, delineando nuove forme di comunicazione e proponendo l’accesso a nuovi tipi di competenze legate alla sfera digitale dei New Media.