Performance Limits in Communication Theory and Practice
Title | Performance Limits in Communication Theory and Practice PDF eBook |
Author | J.K. Skwirzynski |
Publisher | Springer Science & Business Media |
Pages | 437 |
Release | 2012-12-06 |
Genre | Technology & Engineering |
ISBN | 9400927940 |
Proceedings of the NATO Advanced Study Institute on Performance Limits in Communication: Theory and Practice, Il Ciocco, Castelvecchio, Pascoli, Tuscany, Italy, July 7-19, 1986
Performance Limits in Communication Theory and Practice
Title | Performance Limits in Communication Theory and Practice PDF eBook |
Author | J. K. Skwirzynski |
Publisher | |
Pages | 460 |
Release | 1988-05-31 |
Genre | |
ISBN | 9789400927957 |
The Discrete Charm of the Machine
Title | The Discrete Charm of the Machine PDF eBook |
Author | Ken Steiglitz |
Publisher | Princeton University Press |
Pages | 256 |
Release | 2021-11-23 |
Genre | Computers |
ISBN | 0691229023 |
The genesis of the digital idea and why it transformed civilization A few short decades ago, we were informed by the smooth signals of analog television and radio; we communicated using our analog telephones; and we even computed with analog computers. Today our world is digital, built with zeros and ones. Why did this revolution occur? The Discrete Charm of the Machine explains, in an engaging and accessible manner, the varied physical and logical reasons behind this radical transformation. The spark of individual genius shines through this story of innovation: the stored program of Jacquard’s loom; Charles Babbage’s logical branching; Alan Turing’s brilliant abstraction of the discrete machine; Harry Nyquist’s foundation for digital signal processing; Claude Shannon’s breakthrough insights into the meaning of information and bandwidth; and Richard Feynman’s prescient proposals for nanotechnology and quantum computing. Ken Steiglitz follows the progression of these ideas in the building of our digital world, from the internet and artificial intelligence to the edge of the unknown. Are questions like the famous traveling salesman problem truly beyond the reach of ordinary digital computers? Can quantum computers transcend these barriers? Does a mysterious magical power reside in the analog mechanisms of the brain? Steiglitz concludes by confronting the moral and aesthetic questions raised by the development of artificial intelligence and autonomous robots. The Discrete Charm of the Machine examines why our information technology, the lifeblood of our civilization, became digital, and challenges us to think about where its future trajectory may lead.
Cryptography and Coding
Title | Cryptography and Coding PDF eBook |
Author | Bahram Honary |
Publisher | Springer |
Pages | 425 |
Release | 2003-06-30 |
Genre | Computers |
ISBN | 3540453253 |
The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eight International Conference in an established and successful IMA series on the theme of “Cryptography and Coding” was both timely and relevant. The theme of this conference was the future of coding and cryptography, which was touched upon in presentations by a number of invited speakers and researchers. The papers that appear in this book include recent research and development in error control coding and cryptography. These start with mathematical bounds, statistical decoding schemes for error correcting codes, and undetected error probabilities and continue with the theoretical aspects of error correction coding such as graph and trellis decoding, multifunctional and multiple access communication systems, low density parity check codes, and iterative decoding. These are followed by some papers on key recovery attack, authentication, stream cipher design, and analysis of ECIES algorithms, and lattice attacks on IP based protocols.
Maxwell's Demon
Title | Maxwell's Demon PDF eBook |
Author | Harvey S. Leff |
Publisher | Princeton University Press |
Pages | 362 |
Release | 2014-07-14 |
Genre | Science |
ISBN | 1400861527 |
About 120 years ago, James Clerk Maxwell introduced his now legendary hypothetical "demon" as a challenge to the integrity of the second law of thermodynamics. Fascination with the demon persisted throughout the development of statistical and quantum physics, information theory, and computer science--and linkages have been established between Maxwell's demon and each of these disciplines. The demon's seductive quality makes it appealing to physical scientists, engineers, computer scientists, biologists, psychologists, and historians and philosophers of science. Until now its important source material has been scattered throughout diverse journals. This book brings under one cover twenty-five reprints, including seminal works by Maxwell and William Thomson; historical reviews by Martin Klein, Edward Daub, and Peter Heimann; information theoretic contributions by Leo Szilard, Leon Brillouin, Dennis Gabor, and Jerome Rothstein; and innovations by Rolf Landauer and Charles Bennett illustrating linkages with the limits of computation. An introductory chapter summarizes the demon's life, from Maxwell's illustration of the second law's statistical nature to the most recent "exorcism" of the demon based on a need periodically to erase its memory. An annotated chronological bibliography is included. Originally published in 1990. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
Communications and Cryptography
Title | Communications and Cryptography PDF eBook |
Author | Richard E. Blahut |
Publisher | Springer Science & Business Media |
Pages | 473 |
Release | 2012-12-06 |
Genre | Technology & Engineering |
ISBN | 1461526949 |
Information theory is an exceptional field in many ways. Technically, it is one of the rare fields in which mathematical results and insights have led directly to significant engineering payoffs. Professionally, it is a field that has sustained a remarkable degree of community, collegiality and high standards. James L. Massey, whose work in the field is honored here, embodies the highest standards of the profession in his own career. The book covers the latest work on: block coding, convolutional coding, cryptography, and information theory. The 44 contributions represent a cross-section of the world's leading scholars, scientists and researchers in information theory and communication. The book is rounded off with an index and a bibliography of publications by James Massey.
Closing the Gap Between ASIC & Custom
Title | Closing the Gap Between ASIC & Custom PDF eBook |
Author | David Chinnery |
Publisher | Springer Science & Business Media |
Pages | 422 |
Release | 2002-06-30 |
Genre | Computers |
ISBN | 1402071132 |
This book carefully details design tools and techniques for high-performance ASIC design. Using these techniques, the performance of ASIC designs can be improved by two to three times. Important topics include: Improving performance through microarchitecture; Timing-driven floorplanning; Controlling and exploiting clock skew; High performance latch-based design in an ASIC methodology; Automatically identifying and synthesizing complex logic gates; Automated cell sizing to increase performance and reduce power; Controlling process variation.These techniques are illustrated by designs running two to three times the speed of typical ASICs in the same process generation.