Information Science /
From cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Sci...
Autor principal: | |
---|---|
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Princeton, NJ :
Princeton University Press,
[2012]
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000nam a22000005i 4500 | ||
---|---|---|---|
001 | DEGRUYTERUP_9781400829286 | ||
003 | DE-B1597 | ||
005 | 20230103011142.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr || |||||||| | ||
008 | 230103t20122006nju fo d z eng d | ||
020 | |a 9781400829286 | ||
024 | 7 | |a 10.1515/9781400829286 |2 doi | |
035 | |a (DE-B1597)644549 | ||
040 | |a DE-B1597 |b eng |c DE-B1597 |e rda | ||
041 | 0 | |a eng | |
044 | |a nju |c US-NJ | ||
072 | 7 | |a COM020000 |2 bisacsh | |
100 | 1 | |a Luenberger, David G., |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
245 | 1 | 0 | |a Information Science / |c David G. Luenberger. |
264 | 1 | |a Princeton, NJ : |b Princeton University Press, |c [2012] | |
264 | 4 | |c ©2006 | |
300 | |a 1 online resource (448 p.) : |b 210 line illus. 6 halftones. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
505 | 0 | 0 | |t Frontmatter -- |t Contents -- |t Preface -- |t Chapter 1 INTRODUCTION -- |t Part I: ENTROPY: The Foundation of Information -- |t Chapter 2 INFORMATION DEFINITION -- |t Chapter 3 CODES -- |t Chapter 4 COMPRESSION -- |t Chapter 5 CHANNELS -- |t Chapter 6 ERROR-CORRECTING CODES -- |t SUMMARY OF PART I -- |t Part II: ECONOMICS: Strategies for Value -- |t Chapter 7 MARKETS -- |t Chapter 8 PRICING SCHEMES -- |t Chapter 9 VALUE -- |t Chapter 10 INTERACTION -- |t SUMMARY OF PART II -- |t Part III: ENCRYPTION: Security through Mathematics -- |t Chapter 11 CIPHERS -- |t Chapter 12 CRYPTOGRAPHY THEORY -- |t Chapter 13 PUBLIC KEY CRYPTOGRAPHY -- |t Chapter 14 SECURITY PROTOCOLS -- |t Summary of Part III -- |t Part IV: EXTRACTION: Information from Data -- |t Chapter 15 DATA STRUCTURES -- |t Chapter 16 DATABASE SYSTEMS -- |t Chapter 17 INFORMATION RETRIEVAL -- |t Chapter 18 DATA MINING -- |t SUMMARY OF PART IV -- |t Part V: EMISSION: The Mastery of Frequency -- |t Chapter 19 FREQUENCY CONCEPTS -- |t Chapter 20 RADIOWAVES -- |t Chapter 21 SAMPLING AND CAPACITY -- |t Chapter 22 NETWORKS -- |t SUMMARY OF PART V -- |t AUTHOR INDEX -- |t SUBJECT INDEX |
506 | 0 | |a restricted access |u http://purl.org/coar/access_right/c_16ec |f online access with authorization |2 star | |
520 | |a From cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains the most important concepts and insights at the core of this ongoing revolution. The book represents the material used in a widely acclaimed course offered at Stanford University. Drawing concepts from each of the constituent subfields that collectively comprise information science, Luenberger builds his book around the five "E's" of information: Entropy, Economics, Encryption, Extraction, and Emission. Each area directly impacts modern information products, services, and technology--everything from word processors to digital cash, database systems to decision making, marketing strategy to spread spectrum communication. To study these principles is to learn how English text, music, and pictures can be compressed, how it is possible to construct a digital signature that cannot simply be copied, how beautiful photographs can be sent from distant planets with a tiny battery, how communication networks expand, and how producers of information products can make a profit under difficult market conditions. The book contains vivid examples, illustrations, exercises, and points of historic interest, all of which bring to life the analytic methods presented: Presents a unified approach to the field of information science Emphasizes basic principles Includes a wide range of examples and applications Helps students develop important new skills Suggests exercises with solutions in an instructor's manual | ||
538 | |a Mode of access: Internet via World Wide Web. | ||
546 | |a In English. | ||
588 | 0 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 03. Jan 2023) | |
650 | 0 | |a Information science. | |
650 | 0 | |a Information theory. | |
650 | 7 | |a COMPUTERS / Data Transmission Systems / General. |2 bisacsh | |
653 | |a Addition. | ||
653 | |a Algorithm. | ||
653 | |a Alice and Bob. | ||
653 | |a Amplitude. | ||
653 | |a Approximation. | ||
653 | |a Bandwidth (signal processing). | ||
653 | |a Bibliography. | ||
653 | |a Binary code. | ||
653 | |a Binary number. | ||
653 | |a Binary search tree. | ||
653 | |a Binary tree. | ||
653 | |a Bit. | ||
653 | |a Block code. | ||
653 | |a Bubble sort. | ||
653 | |a Caesar cipher. | ||
653 | |a Calculation. | ||
653 | |a Channel capacity. | ||
653 | |a Cipher. | ||
653 | |a Ciphertext. | ||
653 | |a Comma code. | ||
653 | |a Commodity. | ||
653 | |a Common knowledge (logic). | ||
653 | |a Competition. | ||
653 | |a Computation. | ||
653 | |a Computer. | ||
653 | |a Conditional entropy. | ||
653 | |a Conditional probability. | ||
653 | |a Consideration. | ||
653 | |a Consumer. | ||
653 | |a Cryptanalysis. | ||
653 | |a Cryptogram. | ||
653 | |a Cryptography. | ||
653 | |a Customer. | ||
653 | |a Data mining. | ||
653 | |a Data structure. | ||
653 | |a Database. | ||
653 | |a Demand curve. | ||
653 | |a Digital signature. | ||
653 | |a Discounts and allowances. | ||
653 | |a Economic surplus. | ||
653 | |a Encryption. | ||
653 | |a Estimation. | ||
653 | |a Expected value. | ||
653 | |a Fourier series. | ||
653 | |a Fourier transform. | ||
653 | |a Frequency analysis. | ||
653 | |a Functional dependency. | ||
653 | |a Heapsort. | ||
653 | |a Huffman coding. | ||
653 | |a Hyperplane. | ||
653 | |a Information retrieval. | ||
653 | |a Information science. | ||
653 | |a Information theory. | ||
653 | |a Insertion sort. | ||
653 | |a Instance (computer science). | ||
653 | |a Integer. | ||
653 | |a Inverted index. | ||
653 | |a Key size. | ||
653 | |a Letter frequency. | ||
653 | |a Logarithm. | ||
653 | |a Marginal cost. | ||
653 | |a Measurement. | ||
653 | |a Modulation. | ||
653 | |a Notation. | ||
653 | |a Nyquist-Shannon sampling theorem. | ||
653 | |a One-time pad. | ||
653 | |a Parity bit. | ||
653 | |a Percentage. | ||
653 | |a Pricing. | ||
653 | |a Probability. | ||
653 | |a Public-key cryptography. | ||
653 | |a Quantity. | ||
653 | |a Quicksort. | ||
653 | |a Radio wave. | ||
653 | |a Random variable. | ||
653 | |a Ranking (information retrieval). | ||
653 | |a Requirement. | ||
653 | |a Result. | ||
653 | |a Run-length encoding. | ||
653 | |a Shift register. | ||
653 | |a Sine wave. | ||
653 | |a Sorting algorithm. | ||
653 | |a Special case. | ||
653 | |a Spectral density. | ||
653 | |a Spreadsheet. | ||
653 | |a Standard deviation. | ||
653 | |a Subset. | ||
653 | |a Substitution cipher. | ||
653 | |a Summation. | ||
653 | |a Technology. | ||
653 | |a Theorem. | ||
653 | |a Theory. | ||
653 | |a Time complexity. | ||
653 | |a Transmitter. | ||
653 | |a Transposition cipher. | ||
653 | |a Tree (data structure). | ||
653 | |a Tuple. | ||
653 | |a Uncertainty. | ||
653 | |a Value (economics). | ||
653 | |a Word (computer architecture). | ||
856 | 4 | 0 | |u https://doi.uam.elogim.com/10.1515/9781400829286?locatt=mode:legacy |z Texto completo |
856 | 4 | 0 | |u https://degruyter.uam.elogim.com/isbn/9781400829286 |z Texto completo |
912 | |a EBA_BACKALL | ||
912 | |a EBA_CL_CHCOMSGSEN | ||
912 | |a EBA_EBACKALL | ||
912 | |a EBA_EBKALL | ||
912 | |a EBA_ECL_CHCOMSGSEN | ||
912 | |a EBA_EEBKALL | ||
912 | |a EBA_ESTMALL | ||
912 | |a EBA_PPALL | ||
912 | |a EBA_STMALL | ||
912 | |a GBV-deGruyter-alles | ||
912 | |a PDA12STME | ||
912 | |a PDA13ENGE | ||
912 | |a PDA18STMEE | ||
912 | |a PDA5EBK |