Presented to you through Paradigm Publishing Services
Princeton University Press
Chapter
Licensed
Unlicensed
Requires Authentication
Chapter 2 INFORMATION DEFINITION
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xiii
- Chapter 1 INTRODUCTION 1
-
Part I: ENTROPY: The Foundation of Information
- Chapter 2 INFORMATION DEFINITION 9
- Chapter 3 CODES 21
- Chapter 4 COMPRESSION 35
- Chapter 5 CHANNELS 55
- Chapter 6 ERROR-CORRECTING CODES 70
- SUMMARY OF PART I 89
-
Part II: ECONOMICS: Strategies for Value
- Chapter 7 MARKETS 93
- Chapter 8 PRICING SCHEMES 114
- Chapter 9 VALUE 130
- Chapter 10 INTERACTION 143
- SUMMARY OF PART II 161
-
Part III: ENCRYPTION: Security through Mathematics
- Chapter 11 CIPHERS 165
- Chapter 12 CRYPTOGRAPHY THEORY 186
- Chapter 13 PUBLIC KEY CRYPTOGRAPHY 200
- Chapter 14 SECURITY PROTOCOLS 220
- Summary of Part III 237
-
Part IV: EXTRACTION: Information from Data
- Chapter 15 DATA STRUCTURES 241
- Chapter 16 DATABASE SYSTEMS 264
- Chapter 17 INFORMATION RETRIEVAL 284
- Chapter 18 DATA MINING 301
- SUMMARY OF PART IV 327
-
Part V: EMISSION: The Mastery of Frequency
- Chapter 19 FREQUENCY CONCEPTS 331
- Chapter 20 RADIOWAVES 350
- Chapter 21 SAMPLING AND CAPACITY 373
- Chapter 22 NETWORKS 393
- SUMMARY OF PART V 407
- AUTHOR INDEX 409
- SUBJECT INDEX 411
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xiii
- Chapter 1 INTRODUCTION 1
-
Part I: ENTROPY: The Foundation of Information
- Chapter 2 INFORMATION DEFINITION 9
- Chapter 3 CODES 21
- Chapter 4 COMPRESSION 35
- Chapter 5 CHANNELS 55
- Chapter 6 ERROR-CORRECTING CODES 70
- SUMMARY OF PART I 89
-
Part II: ECONOMICS: Strategies for Value
- Chapter 7 MARKETS 93
- Chapter 8 PRICING SCHEMES 114
- Chapter 9 VALUE 130
- Chapter 10 INTERACTION 143
- SUMMARY OF PART II 161
-
Part III: ENCRYPTION: Security through Mathematics
- Chapter 11 CIPHERS 165
- Chapter 12 CRYPTOGRAPHY THEORY 186
- Chapter 13 PUBLIC KEY CRYPTOGRAPHY 200
- Chapter 14 SECURITY PROTOCOLS 220
- Summary of Part III 237
-
Part IV: EXTRACTION: Information from Data
- Chapter 15 DATA STRUCTURES 241
- Chapter 16 DATABASE SYSTEMS 264
- Chapter 17 INFORMATION RETRIEVAL 284
- Chapter 18 DATA MINING 301
- SUMMARY OF PART IV 327
-
Part V: EMISSION: The Mastery of Frequency
- Chapter 19 FREQUENCY CONCEPTS 331
- Chapter 20 RADIOWAVES 350
- Chapter 21 SAMPLING AND CAPACITY 373
- Chapter 22 NETWORKS 393
- SUMMARY OF PART V 407
- AUTHOR INDEX 409
- SUBJECT INDEX 411