Präsentiert durch Paradigm Publishing Services
Princeton University Press
Kapitel
Lizenziert
Nicht lizenziert
Erfordert eine Authentifizierung
Chapter 22 NETWORKS
Sie haben derzeit keinen Zugang zu diesem Inhalt.
Sie haben derzeit keinen Zugang zu diesem Inhalt.
Kapitel in diesem Buch
- Frontmatter i
- Contents vii
- Preface xiii
- Chapter 1 INTRODUCTION 1
-
Part I: ENTROPY: The Foundation of Information
- Chapter 2 INFORMATION DEFINITION 9
- Chapter 3 CODES 21
- Chapter 4 COMPRESSION 35
- Chapter 5 CHANNELS 55
- Chapter 6 ERROR-CORRECTING CODES 70
- SUMMARY OF PART I 89
-
Part II: ECONOMICS: Strategies for Value
- Chapter 7 MARKETS 93
- Chapter 8 PRICING SCHEMES 114
- Chapter 9 VALUE 130
- Chapter 10 INTERACTION 143
- SUMMARY OF PART II 161
-
Part III: ENCRYPTION: Security through Mathematics
- Chapter 11 CIPHERS 165
- Chapter 12 CRYPTOGRAPHY THEORY 186
- Chapter 13 PUBLIC KEY CRYPTOGRAPHY 200
- Chapter 14 SECURITY PROTOCOLS 220
- Summary of Part III 237
-
Part IV: EXTRACTION: Information from Data
- Chapter 15 DATA STRUCTURES 241
- Chapter 16 DATABASE SYSTEMS 264
- Chapter 17 INFORMATION RETRIEVAL 284
- Chapter 18 DATA MINING 301
- SUMMARY OF PART IV 327
-
Part V: EMISSION: The Mastery of Frequency
- Chapter 19 FREQUENCY CONCEPTS 331
- Chapter 20 RADIOWAVES 350
- Chapter 21 SAMPLING AND CAPACITY 373
- Chapter 22 NETWORKS 393
- SUMMARY OF PART V 407
- AUTHOR INDEX 409
- SUBJECT INDEX 411
Kapitel in diesem Buch
- Frontmatter i
- Contents vii
- Preface xiii
- Chapter 1 INTRODUCTION 1
-
Part I: ENTROPY: The Foundation of Information
- Chapter 2 INFORMATION DEFINITION 9
- Chapter 3 CODES 21
- Chapter 4 COMPRESSION 35
- Chapter 5 CHANNELS 55
- Chapter 6 ERROR-CORRECTING CODES 70
- SUMMARY OF PART I 89
-
Part II: ECONOMICS: Strategies for Value
- Chapter 7 MARKETS 93
- Chapter 8 PRICING SCHEMES 114
- Chapter 9 VALUE 130
- Chapter 10 INTERACTION 143
- SUMMARY OF PART II 161
-
Part III: ENCRYPTION: Security through Mathematics
- Chapter 11 CIPHERS 165
- Chapter 12 CRYPTOGRAPHY THEORY 186
- Chapter 13 PUBLIC KEY CRYPTOGRAPHY 200
- Chapter 14 SECURITY PROTOCOLS 220
- Summary of Part III 237
-
Part IV: EXTRACTION: Information from Data
- Chapter 15 DATA STRUCTURES 241
- Chapter 16 DATABASE SYSTEMS 264
- Chapter 17 INFORMATION RETRIEVAL 284
- Chapter 18 DATA MINING 301
- SUMMARY OF PART IV 327
-
Part V: EMISSION: The Mastery of Frequency
- Chapter 19 FREQUENCY CONCEPTS 331
- Chapter 20 RADIOWAVES 350
- Chapter 21 SAMPLING AND CAPACITY 373
- Chapter 22 NETWORKS 393
- SUMMARY OF PART V 407
- AUTHOR INDEX 409
- SUBJECT INDEX 411