Listing 1 - 10 of 563 << page
of 57
>>
Sort by

Book
2010 Information Theory and Applications Workshop
Authors: ---
ISBN: 1424470129 1424470145 Year: 2010 Publisher: [Place of publication not identified] I E E E

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Theory of information : fundamentality, diversity and unification
Author:
ISBN: 1282760505 9786612760501 9812835490 9789812835499 9789812835482 9812835482 Year: 2010 Publisher: Hackensack, N.J. : World Scientific,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This unique volume presents a new approach - the general theory of information - to scientific understanding of information phenomena. Based on a thorough analysis of information processes in nature, technology, and society, as well as on the main directions in information theory, this theory synthesizes existing directions into a unified system. The book explains how this theory opens new kinds of possibilities for information technology, information sciences, computer science, knowledge engineering, psychology, linguistics, social sciences, and education. The book also gives a broad


Book
2010 International Symposium on Information Theory and Its Applications
Author:
ISBN: 1424460166 1424460174 Year: 2010 Publisher: [Place of publication not identified] I E E E

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Selected topics in information and coding theory
Authors: --- ---
ISBN: 1282760718 9786612760716 9812837175 9789812837172 9789812837165 9812837167 Year: 2010 Publisher: Singapore ; Hackensack, N.J. : World Scientific,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The last few years have witnessed rapid advancements in information and coding theory research and applications. This book provides a comprehensive guide to selected topics, both ongoing and emerging, in information and coding theory. Consisting of contributions from well-known and high-profile researchers in their respective specialties, topics that are covered include source coding; channel capacity; linear complexity; code construction, existence and analysis; bounds on codes and designs; space-time coding; LDPC codes; and, codes and cryptography. All of the chapters are integrated in a man


Book
Income uncertainty and household savings in China
Authors: --- ---
Year: 2010 Publisher: Cambridge, Massachusetts : National Bureau of Economic Research,

Loading...
Export citation

Choose an application

Bookmark

Abstract

China's household saving rate has increased markedly since the mid-1990s and the age-savings profile has become U-shaped during the 2000s. We find that rising income uncertainty and pension reforms help explain both of these phenomena. Using a panel of Chinese households covering the period 1989-2006, we document that strong average income growth has been accompanied by a substantial increase in income uncertainty. Interestingly, the permanent variance of household income remains stable while it is the transitory variance that rises sharply. A calibration of a buffer-stock savings model indicates that rising savings rates among younger households are consistent with rising income uncertainty and higher saving rates among older households are consistent with a decline in the pension replacement ratio for those retiring after 1997. We conclude that rising income uncertainty and pension reforms can account for over half of the increase in the urban household savings rate in China since the mid-1990s as well as the U-shaped age-saving profile.


Book
Quantum information : an introduction
Author:
ISBN: 9783642067693 3642067697 Year: 2010 Publisher: Berlin ; London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Institutionelle Hintergründe und Konsequenzen von Wissen
Authors: ---
ISBN: 3428533704 3428133706 3428833708 Year: 2010 Publisher: Berlin : Duncker & Humblot,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hauptbeschreibung Die Klammer der einzelnen Beiträge dieses Bandes bilden die institutionellen Hintergründe und die Wirkungen von Wissen. Wissen wird in Gesellschaft, Politik und Wirtschaft auf unterschiedliche Weise institutionalisiert. Daher beeinflussen konkrete Institutionen die Entstehung, den Transfer und die Koordination von Wissen. Wissen selbst ermöglicht auch die Entwicklung guter Institutionen und entfaltet seine Wirkungen in Wirtschaft, Politik und Gesellschaft. In einem ersten Teil werden Institutionen identifiziert und analysiert, die zur Entstehung und Koordinierung v


Book
Database Replication
Authors: --- ---
ISBN: 3031018397 Year: 2010 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Database replication is widely used for fault-tolerance, scalability and performance. The failure of one database replica does not stop the system from working as available replicas can take over the tasks of the failed replica. Scalability can be achieved by distributing the load across all replicas, and adding new replicas should the load increase. Finally, database replication can provide fast local access, even if clients are geographically distributed clients, if data copies are located close to clients. Despite its advantages, replication is not a straightforward technique to apply, and there are many hurdles to overcome. At the forefront is replica control: assuring that data copies remain consistent when updates occur. There exist many alternatives in regard to where updates can occur and when changes are propagated to data copies, how changes are applied, where the replication tool is located, etc. A particular challenge is to combine replica control with transaction management as it requires several operations to be treated as a single logical unit, and it provides atomicity, consistency, isolation and durability across the replicated system. The book provides a categorization of replica control mechanisms, presents several replica and concurrency control mechanisms in detail, and discusses many of the issues that arise when such solutions need to be implemented within or on top of relational database systems. Furthermore, the book presents the tasks that are needed to build a fault-tolerant replication solution, provides an overview of load-balancing strategies that allow load to be equally distributed across all replicas, and introduces the concept of self-provisioning that allows the replicated system to dynamically decide on the number of replicas that are needed to handle the current load. As performance evaluation is a crucial aspect when developing a replication tool, the book presents an analytical model of the scalability potential of various replication solution. For readers that are only interested in getting a good overview of the challenges of database replication and the general mechanisms of how to implement replication solutions, we recommend to read Chapters 1 to 4. For readers that want to get a more complete picture and a discussion of advanced issues, we further recommend the Chapters 5, 8, 9 and 10. Finally, Chapters 6 and 7 are of interest for those who want get familiar with thorough algorithm design and correctness reasoning. Table of Contents: Overview / 1-Copy-Equivalence and Consistency / Basic Protocols / Replication Architecture / The Scalability of Replication / Eager Replication and 1-Copy-Serializability / 1-Copy-Snapshot Isolation / Lazy Replication / Self-Configuration and Elasticity / Other Aspects of Replication.


Book
Access Control in Data Management Systems : A Visual Querying Perspective
Author:
ISBN: 3031018362 Year: 2010 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary, mandatory, and role-based access control will be discussed, by surveying the most relevant proposals and analyzing the benefits and drawbacks of each paradigm in view of the requirements of different application domains. Access control mechanisms provided by commercial Data Management Systems are presented and discussed. Finally, the last part of the book is devoted to discussion of some of the most challenging and innovative research trends in the area of access control, such as those related to the Web 2.0 revolution or to the Database as a Service paradigm. This book is a valuable reference for an heterogeneous audience. It can be used as either an extended survey for people who are interested in access control or as a reference book for senior undergraduate or graduate courses in data security with a special focus on access control. It is also useful for technologists, researchers, managers, and developers who want to know more about access control and related emerging trends. Table of Contents: Access Control: Basic Concepts / Discretionary Access Control for Relational Data Management Systems / Discretionary Access Control for Advanced Data Models / Mandatory Access Control / Role-based Access Control / Emerging Trends in Access Control.


Book
Privacy-Preserving Data Publishing
Authors: ---
ISBN: 3031018346 Year: 2010 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Privacy preservation has become a major issue in many data analysis applications. When a data set is released to other parties for data analysis, privacy-preserving techniques are often required to reduce the possibility of identifying sensitive information about individuals. For example, in medical data, sensitive information can be the fact that a particular patient suffers from HIV. In spatial data, sensitive information can be a specific location of an individual. In web surfing data, the information that a user browses certain websites may be considered sensitive. Consider a dataset containing some sensitive information is to be released to the public. In order to protect sensitive information, the simplest solution is not to disclose the information. However, this would be an overkill since it will hinder the process of data analysis over the data from which we can find interesting patterns. Moreover, in some applications, the data must be disclosed under the government regulations. Alternatively, the data owner can first modify the data such that the modified data can guarantee privacy and, at the same time, the modified data retains sufficient utility and can be released to other parties safely. This process is usually called as privacy-preserving data publishing. In this monograph, we study how the data owner can modify the data and how the modified data can preserve privacy and protect sensitive information. Table of Contents: Introduction / Fundamental Concepts / One-Time Data Publishing / Multiple-Time Data Publishing / Graph Data / Other Data Types / Future Research Directions.

Listing 1 - 10 of 563 << page
of 57
>>
Sort by