Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Informationstheorie. --- Informationstheorie. --- Kybernetik. --- Kybernetik. --- Lernen. --- Lernen.
Choose an application
Cybernetics --- Cybernétique --- Systèmes, Théorie des --- Cybernetica. --- Systemen. --- Kybernetik. --- Informationstheorie. --- Congrès.
Choose an application
In der vorliegenden Arbeit wird eine Methodik entwickelt und evaluiert, die es erlaubt Mehrantennensysteme zu optimieren. Schwerpunkt ist hierbei die Synthese kapazitätsoptimierter Richtcharakteristiken basierend auf spezifischen Einschränkungen des Antennendesigns. Die Grundidee hinter dieser Synthese ist es, Antennensysteme mit einem auf ein Volumen bezogenes Kanalwissen zu optimieren.
Fahrzeugantennen --- Fahrzeug-zu-Fahrzeug Kommunikation --- Informationstheorie --- Antennenoptimierung --- Mehrantennensysteme
Choose an application
Information science. --- Informationstheorie. --- Maschinelle Übersetzung. --- Mathematical linguistics. --- Russisch. --- Semiotics. --- Semiotiek. --- Semiotik. --- Taalkunde.
Choose an application
Ausgehend von den Erkenntnissen von FAUNA (2018), führen die bildende Künstlerin Elena Peytchinska und der Dichter Thomas Ballhausen im Rahmen von FLORA eine weitere Auseinandersetzung mit heutiger Information und deren Theoretisierung. Peytchinskas Pflanzendiagramme und Ballhausens literarische Texte entwerfen eine Textur: nicht nur von Landschaften der Information und ihrer Ordnungen, sondern auch von der dialogischen, lesbar gemachten sprachkünstlerischen Praxis. Im Buch, gleichermaßen Objekt wie Ort, werden geometrische und topologische Strategien zu einem erneuerten räumlichen Denken verbunden. FLORA kartografiert diese Räume und erschließt die vernetzten Territorien mit den ästhetischen und wissenschaftlichen Mitteln der Sprachkunst. Based on the findings in FAUNA (2018), the visual artist Elena Peytchinska and the poet Thomas Ballhausen, in FLORA, continue their discourse on contemporary information and its theorization. Peytchinska’s plant diagrams and Ballhausen’s literary texts create a "texture" – not only of landscapes of information and the way in which they are ordered, but also of the dialogic practice of the linguistic art made readable. In the book, which is both object and place at the same time, geometric and topological strategies are combined to produce novel spatial mentation. FLORA maps these spaces and explores the networked territories with the aesthetic and scientific means of linguistic art.
Diagrammatik. --- Informationstheorie. --- Literatur. --- Sprachkunst. --- künstlerische Forschung. --- Literature. --- artistic research. --- language arts.
Choose an application
This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.
Computer science. --- Data protection. --- Data encryption (Computer science). --- Coding theory. --- Information Systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Coding and Information Theory. --- e-Commerce/e-business. --- Management of Computing and Information Systems. --- Computers and Society. --- Data encryption (Computer science) --- Computer networks --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Computer security. --- Computers and civilization. --- Management information systems. --- E-commerce. --- Codierungstheorie. --- Informationsloses Beweissystem. --- Informationstheorie. --- Kryptologie. --- Kryptosystem. --- Mehrparteienprotokoll. --- Secret-Sharing. --- Secret sharing --- Betrügererkennung --- Kryptologie --- Multiparty protocol --- Kommunikationsprotokoll --- Kryptographisches System --- Verschlüsselungssystem --- Chiffriersystem --- Chiffrierung --- Paarungsbasierte Kryptografie --- Geheimcodetechnik --- Kryptografie --- Kryptographie --- Datenverschlüsselung --- Steganographie --- Kryptologe --- Nachrichtentheorie --- Kybernetik --- Zero-knowledge proof system --- Zero-Knowledge-Beweis --- Kenntnisfreier Beweis --- Zero-Knowledge-Protokoll --- Interaktives Beweissystem --- Codierung --- Theorie --- Cryptology. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Science --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Cryptography --- Protection --- Betrügererkennung --- Geheimschlüssel --- Datenverschlüsselung --- Information theory. --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication theory --- Communication --- Cybernetics --- Communication systems
Listing 1 - 6 of 6 |
Sort by
|