"This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions ...on the use and comparative benefits of methods and description of ""how to"" use them. Detailed descriptions and explanations of the most well-known and frequently used compression methods are covered in a self-contained fashion, with an accessible style and technical level for specialists and nonspecialists. This 4th edition of this successful volume contains significant additional material as there has been tremendous progress in this field, especially in audio compression such as FLAC, AAC, WavPack, ALS and Dolby AC3, which are all covered. Additional key features include: RAR, Tunstall code, Differential and Hyperspectral Compression, LZMA, H.264, 3D data sets, PDF. This book provides an invaluable reference and guide for all researchers and practitioners needing a comprehensive compilation for a broad range of compression methods."
Blockchain Basics Drescher, Daniel
2017, 2017-03-14T00:00:00, 2017-03-14, 2017.
eBook
In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, ...mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.What You'll LearnWhat the blockchain isWhy it is needed and what problem it solvesWhy there is so much excitement about the blockchain and its potentialMajor components and their purposeHow various components of the blockchain work and interactLimitations, why they exist, and what has been done to overcome themMajor application scenariosWho This Book Is ForEveryone who wants to get a general idea of what blockchain technology is, how it works, and how it will potentially change the financial system as we know it
This book constitutes the refereed proceedings of the 14th International Conference on Reachability Problems, RP 2020, held in Paris, France in October 2020.The 8 full papers presented were carefully ...reviewed and selected from 25 submissions. In addition, 2 invited papers were included in this volume. The papers cover topics such as reachability for infinite state systems; rewriting systems; reachability analysis in counter/timed/cellular/communicating automata; Petri nets; computational aspects of semigroups, groups, and rings; reachability in dynamical and hybrid systems; frontiers between decidable and undecidable reachability problems; complexity and decidability aspects; predictability in iterative maps; and new computational paradigms.
The Burrows-Wheeler Transform is a text transformation scheme that has found applications in different aspects of the data explosion problem, from data compression to index structures and search. The ...BWT belongs to a new class of compression algorithms, distinguished by its ability to perform compression by sorted contexts. More recently, the BWT has also found various applications in addition to text data compression, such as in lossless and lossy image compression, tree-source identification, bioinformatics, machine translation, shape matching, and test data compression. This book will serve as a reference for seasoned professionals and researchers in the area, while providing a gentle introduction that makes it accessible for senior undergraduate students or first-year graduate students embarking upon research in compression, pattern matching, full text retrieval, compressed index structures, or other areas related to the BWT.
Real-time object detection is one of the most important research topics in computer vision. As new approaches regarding architecture optimization and training optimization are continually being ...developed, we have found two research topics that have spawned when dealing with these latest state-of-the-art methods. To address the topics, we propose a trainable bag-of-freebies oriented solution. We combine the flexible and efficient training tools with the proposed architecture and the compound scaling method. YOLOv7 surpasses all known object detectors in both speed and accuracy in the range from 5 FPS to 120 FPS and has the highest accuracy 56.8% AP among all known real-time object detectors with 30 FPS or higher on GPU V100. Source code is released in https://github.com/WongKinYiu/yolov7.
Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic ...signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analysis Attacks: Revealing the Secrets of Smart Cardsis the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, the authors provide an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles. By analyzing the pros and cons of the different countermeasures, this volume allows practitioners to decide how to protect smart cards.
Data Clustering Aggarwal, Charu C; Reddy, Chandan K
2014, 2013, 2018-09-03, 2013-08-21, Letnik:
31
eBook
In this book, top researchers from around the world cover the entire area of clustering, from basic methods to more refined and complex data clustering approaches. They pay special attention to ...recent issues in graphs, social networks, and other domains. The book explores the characteristics of clustering problems in a variety of application areas. It also explains how to glean detailed insight from the clustering process--including how to verify the quality of the underlying clusters--through supervision, human intervention, or the automated generation of alternative clusters.
Chaos-based cryptography has attracted great interest in the past decade. This book gives a thorough description of chaos-based cryptography. Written by leading experts, it covers the basic theories, ...algorithms and applications of chaos-based cryptography.
Algebraic Cryptanalysis acts as a guide for advanced-level students and researchers/practitioners who wish to enter this new field. This text bridges the gap between a course in cryptography, and ...being able to read the cryptanalytic literature. Algebraic Cryptanalysis also covers several chapters on finite field linear algebra and the equicomplexity of matrix operations. This volume introduces several techniques, including linear systems of equations over finite fields, polynomial systems, along with how to adapt the latter to be solved by SAT-solvers. The cipher Keeloq, used in nearly all automobiles with remote key-less entry, is described as a running example, including the manipulation of the equations to enable their solution. Algebraic Cryptanalysis is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners working for intelligence agencies or security companies. Finally, this work is of special interest to algebraic geometers interested in seeking more applied topics.