Narrow your search
Listing 1 - 6 of 6
Sort by

Dissertation
Der Lernprozess der Unternehmung : ein Ansatz zu einem kybernetischen Grundmodell der Betriebswirtschaft

Loading...
Export citation

Choose an application

Bookmark

Abstract

Current topics in cybernetics and systems : proceedings of the fourth International congress of cybernetics & systems, 21-25 August, 1978, Amsterdam
Author:
ISBN: 3540089772 9783540089773 0387089772 9780387089775 3642931065 3642931049 Year: 1978 Publisher: Berlin Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Methodik für den Entwurf von kapazitätsoptimierten Mehrantennensystemen am Fahrzeug
Author:
ISBN: 1000035504 3731500477 Year: 2013 Publisher: KIT Scientific Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

In der vorliegenden Arbeit wird eine Methodik entwickelt und evaluiert, die es erlaubt Mehrantennensysteme zu optimieren. Schwerpunkt ist hierbei die Synthese kapazitätsoptimierter Richtcharakteristiken basierend auf spezifischen Einschränkungen des Antennendesigns. Die Grundidee hinter dieser Synthese ist es, Antennensysteme mit einem auf ein Volumen bezogenes Kanalwissen zu optimieren.


Periodical
Semiotika i informatika.
ISSN: 01358537 Publisher: Moskva : Jazyki russkoj kul'tury,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
FLORA : Sprachkunst im Zeitalter der Information / Language Arts in the Age of Information
Authors: ---
ISBN: 3110675390 Year: 2020 Publisher: Berlin ; Boston : De Gruyter,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Ausgehend von den Erkenntnissen von FAUNA (2018), führen die bildende Künstlerin Elena Peytchinska und der Dichter Thomas Ballhausen im Rahmen von FLORA eine weitere Auseinandersetzung mit heutiger Information und deren Theoretisierung. Peytchinskas Pflanzendiagramme und Ballhausens literarische Texte entwerfen eine Textur: nicht nur von Landschaften der Information und ihrer Ordnungen, sondern auch von der dialogischen, lesbar gemachten sprachkünstlerischen Praxis. Im Buch, gleichermaßen Objekt wie Ort, werden geometrische und topologische Strategien zu einem erneuerten räumlichen Denken verbunden. FLORA kartografiert diese Räume und erschließt die vernetzten Territorien mit den ästhetischen und wissenschaftlichen Mitteln der Sprachkunst. Based on the findings in FAUNA (2018), the visual artist Elena Peytchinska and the poet Thomas Ballhausen, in FLORA, continue their discourse on contemporary information and its theorization. Peytchinska’s plant diagrams and Ballhausen’s literary texts create a "texture" – not only of landscapes of information and the way in which they are ordered, but also of the dialogic practice of the linguistic art made readable. In the book, which is both object and place at the same time, geometric and topological strategies are combined to produce novel spatial mentation. FLORA maps these spaces and explores the networked territories with the aesthetic and scientific means of linguistic art.


Book
Information Theoretic Security : 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings
Authors: ---
ISBN: 331904267X 3319042688 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.

Keywords

Computer science. --- Data protection. --- Data encryption (Computer science). --- Coding theory. --- Information Systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Coding and Information Theory. --- e-Commerce/e-business. --- Management of Computing and Information Systems. --- Computers and Society. --- Data encryption (Computer science) --- Computer networks --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Computer security. --- Computers and civilization. --- Management information systems. --- E-commerce. --- Codierungstheorie. --- Informationsloses Beweissystem. --- Informationstheorie. --- Kryptologie. --- Kryptosystem. --- Mehrparteienprotokoll. --- Secret-Sharing. --- Secret sharing --- Betrügererkennung --- Kryptologie --- Multiparty protocol --- Kommunikationsprotokoll --- Kryptographisches System --- Verschlüsselungssystem --- Chiffriersystem --- Chiffrierung --- Paarungsbasierte Kryptografie --- Geheimcodetechnik --- Kryptografie --- Kryptographie --- Datenverschlüsselung --- Steganographie --- Kryptologe --- Nachrichtentheorie --- Kybernetik --- Zero-knowledge proof system --- Zero-Knowledge-Beweis --- Kenntnisfreier Beweis --- Zero-Knowledge-Protokoll --- Interaktives Beweissystem --- Codierung --- Theorie --- Cryptology. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Science --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Cryptography --- Protection --- Betrügererkennung --- Geheimschlüssel --- Datenverschlüsselung --- Information theory. --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication theory --- Communication --- Cybernetics --- Communication systems

Listing 1 - 6 of 6
Sort by