Error Correcting Coding and Security for Data Networks

Error Correcting Coding and Security for Data Networks
Author :
Publisher : John Wiley & Sons
Total Pages : 288
Release :
ISBN-10 : 9780470867563
ISBN-13 : 0470867566
Rating : 4/5 (566 Downloads)

Book Synopsis Error Correcting Coding and Security for Data Networks by : Grigorii Kabatiansky

Download or read book Error Correcting Coding and Security for Data Networks written by Grigorii Kabatiansky and published by John Wiley & Sons. This book was released on 2005-10-31 with total page 288 pages. Available in PDF, EPUB and Kindle. Book excerpt: Error correcting coding is often analyzed in terms of its application to the separate levels within the data network in isolation from each other. In this fresh approach, the authors consider the data network as a superchannel (a multi-layered entity) which allows error correcting coding to be evaluated as it is applied to a number of network layers as a whole. By exposing the problems of applying error correcting coding in data networks, and by discussing coding theory and its applications, this original technique shows how to correct errors in the network through joint coding at different network layers. Discusses the problem of reconciling coding applied to different layers using a superchannel approach Includes thorough coverage of all the key codes: linear block codes, Hamming, BCH and Reed-Solomon codes, LDPC codes decoding, as well as convolutional, turbo and iterative coding Considers new areas of application of error correcting codes such as transport coding, code-based cryptosystems and coding for image compression Demonstrates how to use error correcting coding to control such important data characteristics as mean message delay Provides theoretical explanations backed up by numerous real-world examples and practical recommendations Features a companion website containing additional research results including new constructions of LDPC codes, joint error-control coding and synchronization, Reed-Muller codes and their list decoding By progressing from theory through to practical problem solving, this resource contains invaluable advice for researchers, postgraduate students, engineers and computer scientists interested in data communications and applications of coding theory.


Error Correcting Coding and Security for Data Networks Related Books

Error Correcting Coding and Security for Data Networks
Language: en
Pages: 288
Authors: Grigorii Kabatiansky
Categories: Technology & Engineering
Type: BOOK - Published: 2005-10-31 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Error correcting coding is often analyzed in terms of its application to the separate levels within the data network in isolation from each other. In this fresh
Post-Quantum Cryptography
Language: en
Pages: 305
Authors: Bo-Yin Yang
Categories: Computers
Type: BOOK - Published: 2011-11-25 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, held in Taipei, Taiwan, in Novembe
Advances in Communications, Computing, Networks and Security Volume 10
Language: en
Pages: 241
Authors: Paul Dowland
Categories: Computers
Type: BOOK - Published: 2013-11-04 - Publisher: Lulu.com

DOWNLOAD EBOOK

This book is the tenth in a series presenting research papers arising from MSc/MRes research projects undertaken by students of the School of Computing and Math
Foundations and Practice of Security
Language: en
Pages: 263
Authors: Joaquin Garcia-Alfaro
Categories: Computers
Type: BOOK - Published: 2012-01-09 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2
A Mathematical Approach to Research Problems of Science and Technology
Language: en
Pages: 497
Authors: Ryuei Nishii
Categories: Technology & Engineering
Type: BOOK - Published: 2014-07-14 - Publisher: Springer

DOWNLOAD EBOOK

This book deals with one of the most novel advances in mathematical modeling for applied scientific technology, including computer graphics, public-key encrypti