Cargando…

Information Science /

From cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Sci...

Descripción completa

Detalles Bibliográficos
Autor principal: Luenberger, David G. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Princeton, NJ : Princeton University Press, [2012]
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000nam a22000005i 4500
001 DEGRUYTERUP_9781400829286
003 DE-B1597
005 20230103011142.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 230103t20122006nju fo d z eng d
020 |a 9781400829286 
024 7 |a 10.1515/9781400829286  |2 doi 
035 |a (DE-B1597)644549 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a nju  |c US-NJ 
072 7 |a COM020000  |2 bisacsh 
100 1 |a Luenberger, David G.,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Information Science /  |c David G. Luenberger. 
264 1 |a Princeton, NJ :   |b Princeton University Press,   |c [2012] 
264 4 |c ©2006 
300 |a 1 online resource (448 p.) :  |b 210 line illus. 6 halftones. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 0 |t Frontmatter --   |t Contents --   |t Preface --   |t Chapter 1 INTRODUCTION --   |t Part I: ENTROPY: The Foundation of Information --   |t Chapter 2 INFORMATION DEFINITION --   |t Chapter 3 CODES --   |t Chapter 4 COMPRESSION --   |t Chapter 5 CHANNELS --   |t Chapter 6 ERROR-CORRECTING CODES --   |t SUMMARY OF PART I --   |t Part II: ECONOMICS: Strategies for Value --   |t Chapter 7 MARKETS --   |t Chapter 8 PRICING SCHEMES --   |t Chapter 9 VALUE --   |t Chapter 10 INTERACTION --   |t SUMMARY OF PART II --   |t Part III: ENCRYPTION: Security through Mathematics --   |t Chapter 11 CIPHERS --   |t Chapter 12 CRYPTOGRAPHY THEORY --   |t Chapter 13 PUBLIC KEY CRYPTOGRAPHY --   |t Chapter 14 SECURITY PROTOCOLS --   |t Summary of Part III --   |t Part IV: EXTRACTION: Information from Data --   |t Chapter 15 DATA STRUCTURES --   |t Chapter 16 DATABASE SYSTEMS --   |t Chapter 17 INFORMATION RETRIEVAL --   |t Chapter 18 DATA MINING --   |t SUMMARY OF PART IV --   |t Part V: EMISSION: The Mastery of Frequency --   |t Chapter 19 FREQUENCY CONCEPTS --   |t Chapter 20 RADIOWAVES --   |t Chapter 21 SAMPLING AND CAPACITY --   |t Chapter 22 NETWORKS --   |t SUMMARY OF PART V --   |t AUTHOR INDEX --   |t SUBJECT INDEX 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a From cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains the most important concepts and insights at the core of this ongoing revolution. The book represents the material used in a widely acclaimed course offered at Stanford University. Drawing concepts from each of the constituent subfields that collectively comprise information science, Luenberger builds his book around the five "E's" of information: Entropy, Economics, Encryption, Extraction, and Emission. Each area directly impacts modern information products, services, and technology--everything from word processors to digital cash, database systems to decision making, marketing strategy to spread spectrum communication. To study these principles is to learn how English text, music, and pictures can be compressed, how it is possible to construct a digital signature that cannot simply be copied, how beautiful photographs can be sent from distant planets with a tiny battery, how communication networks expand, and how producers of information products can make a profit under difficult market conditions. The book contains vivid examples, illustrations, exercises, and points of historic interest, all of which bring to life the analytic methods presented: Presents a unified approach to the field of information science Emphasizes basic principles Includes a wide range of examples and applications Helps students develop important new skills Suggests exercises with solutions in an instructor's manual 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 03. Jan 2023) 
650 0 |a Information science. 
650 0 |a Information theory. 
650 7 |a COMPUTERS / Data Transmission Systems / General.  |2 bisacsh 
653 |a Addition. 
653 |a Algorithm. 
653 |a Alice and Bob. 
653 |a Amplitude. 
653 |a Approximation. 
653 |a Bandwidth (signal processing). 
653 |a Bibliography. 
653 |a Binary code. 
653 |a Binary number. 
653 |a Binary search tree. 
653 |a Binary tree. 
653 |a Bit. 
653 |a Block code. 
653 |a Bubble sort. 
653 |a Caesar cipher. 
653 |a Calculation. 
653 |a Channel capacity. 
653 |a Cipher. 
653 |a Ciphertext. 
653 |a Comma code. 
653 |a Commodity. 
653 |a Common knowledge (logic). 
653 |a Competition. 
653 |a Computation. 
653 |a Computer. 
653 |a Conditional entropy. 
653 |a Conditional probability. 
653 |a Consideration. 
653 |a Consumer. 
653 |a Cryptanalysis. 
653 |a Cryptogram. 
653 |a Cryptography. 
653 |a Customer. 
653 |a Data mining. 
653 |a Data structure. 
653 |a Database. 
653 |a Demand curve. 
653 |a Digital signature. 
653 |a Discounts and allowances. 
653 |a Economic surplus. 
653 |a Encryption. 
653 |a Estimation. 
653 |a Expected value. 
653 |a Fourier series. 
653 |a Fourier transform. 
653 |a Frequency analysis. 
653 |a Functional dependency. 
653 |a Heapsort. 
653 |a Huffman coding. 
653 |a Hyperplane. 
653 |a Information retrieval. 
653 |a Information science. 
653 |a Information theory. 
653 |a Insertion sort. 
653 |a Instance (computer science). 
653 |a Integer. 
653 |a Inverted index. 
653 |a Key size. 
653 |a Letter frequency. 
653 |a Logarithm. 
653 |a Marginal cost. 
653 |a Measurement. 
653 |a Modulation. 
653 |a Notation. 
653 |a Nyquist-Shannon sampling theorem. 
653 |a One-time pad. 
653 |a Parity bit. 
653 |a Percentage. 
653 |a Pricing. 
653 |a Probability. 
653 |a Public-key cryptography. 
653 |a Quantity. 
653 |a Quicksort. 
653 |a Radio wave. 
653 |a Random variable. 
653 |a Ranking (information retrieval). 
653 |a Requirement. 
653 |a Result. 
653 |a Run-length encoding. 
653 |a Shift register. 
653 |a Sine wave. 
653 |a Sorting algorithm. 
653 |a Special case. 
653 |a Spectral density. 
653 |a Spreadsheet. 
653 |a Standard deviation. 
653 |a Subset. 
653 |a Substitution cipher. 
653 |a Summation. 
653 |a Technology. 
653 |a Theorem. 
653 |a Theory. 
653 |a Time complexity. 
653 |a Transmitter. 
653 |a Transposition cipher. 
653 |a Tree (data structure). 
653 |a Tuple. 
653 |a Uncertainty. 
653 |a Value (economics). 
653 |a Word (computer architecture). 
856 4 0 |u https://doi.uam.elogim.com/10.1515/9781400829286?locatt=mode:legacy  |z Texto completo 
856 4 0 |u https://degruyter.uam.elogim.com/isbn/9781400829286  |z Texto completo 
912 |a EBA_BACKALL 
912 |a EBA_CL_CHCOMSGSEN 
912 |a EBA_EBACKALL 
912 |a EBA_EBKALL 
912 |a EBA_ECL_CHCOMSGSEN 
912 |a EBA_EEBKALL 
912 |a EBA_ESTMALL 
912 |a EBA_PPALL 
912 |a EBA_STMALL 
912 |a GBV-deGruyter-alles 
912 |a PDA12STME 
912 |a PDA13ENGE 
912 |a PDA18STMEE 
912 |a PDA5EBK