Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
We gebruiken cookies om:
De website vlot te laten werken, de beveiliging te verbeteren en fraude te voorkomen
Inzicht te krijgen in het gebruik van de website, om zo de inhoud en functionaliteiten ervan te verbeteren
Je op externe platformen de meest relevante advertenties te kunnen tonen
Je cookievoorkeuren
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
The issue of biometric security has become a major research area recently. While systems based on iris-recognition, DNA analysis and fingerprinting ar...Lees meer
Common information measures the amount of matching variables in two or more information sources. It is ubiquitous in information theory and related ar...Lees meer
Reed-Muller (RM) codes are among the oldest, simplest and perhaps most ubiquitous family of codes. They are used in many areas of coding theory in bot...Lees meer
Due to its longevity and enormous information density, DNA is an attractive medium for archival data storage. Natural DNA more than 700.000 years old ...Lees meer
Algebraic number theory is gaining an increasing impact in code design for many different coding applications, such as single antenna fading channels ...Lees meer
Security is one of the most important issues in communications. Security issues arising in communication networks include confidentiality, integrity, ...Lees meer
Developing increasingly computationally-efficient codes for communication and compression has been the major goal of information and coding theory. Th...Lees meer
Performance Analysis of Linear Codes under Maximum-Likelihood Decoding: A Tutorial focuses on the performance evaluation of linear codes under optimal...Lees meer
Concentration inequalities have been the subject of exciting developments during the last two decades, and have been intensively studied and used as a...Lees meer
The field of community detection has been expanding greatly since the 1980s, with a remarkable diversity of models and algorithms developed in differe...Lees meer
This second edition includes several new sections and provides a full update on all sections. This book was welcomed when it was first published as an...Lees meer
Majorization Theory and Matrix-Monotone Functions in Wireless Communications, reviews the basic definitions of Majorization Theory and Matrix-Monotone...Lees meer
Data storage has grown such that distributed storage over a number of systems is now commonplace. This has given rise to an increase in the complexity...Lees meer
Over the past 2 decades, Frames have become tools in designing signal processing and communication systems where redundancy is a requirement. To name ...Lees meer
Probabilistic amplitude shaping (PAS) is a practical architecture for combining non-uniform distributions on higher-order constellations with off-the-...Lees meer
This monograph provides a tutorial review of the Lattice-Reduction-Aided and Integer-Forcing approaches to equalization in MIMO communications. The au...Lees meer
This monograph serves as an introduction and detailed overview of some important topics in distribution testing, an area of theoretical computer scien...Lees meer
Topics in Multi-User Information Theory presents a review of eleven of the fundamental issues in multi-user information theory. Each chapter is devote...Lees meer
Entropy, mutual information and divergence measure the randomness, dependence and dissimilarity, respectively, of random objects. In addition to their...Lees meer
Non-volatile memories (NVMs) have emerged as the primary replacement of hard-disk drives for a variety of storage applications, including personal ele...Lees meer
The authors of this monograph survey a suite of techniques based on the theory of polynomials, collectively referred to as polynomial methods. These t...Lees meer
The advent of Big Data analytics and cloud computing has resulted in an unprecedented increase in the demand for distributed data storage demand. Comp...Lees meer
Multiple-input multiple-output (MIMO) channels provide an abstract and unified representation of different physical communication systems, ranging fro...Lees meer
Combinatorial Designs for Authentication and Secrecy Codes is a succinct in-depth review and tutorial of a subject that promises to lead to major adva...Lees meer