did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781402072512

Communications, Information and Network Security

by ; ; ;
  • ISBN13:

    9781402072512

  • ISBN10:

    1402072511

  • Format: Hardcover
  • Copyright: 2002-12-01
  • Publisher: Kluwer Academic Pub
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $249.99 Save up to $196.33
  • Digital
    $116.27
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Communications, Information and Network Security is an excellent reference for both professional and academic researchers in the field of communication. Those working in space-time coding, multiuser detection, and wireless networks will find the book to be of particular use. New and highly original results by leading experts in communication, information theory, and data security are presented. Communications, Information and Network Security is a tribute to the broad and profound work of Ian Blake in the field of communication. All of the contributors have individually and collectively dedicated their work to Professor Blake.

Table of Contents

List of Figures
xiii
List of Tables
xix
Preface xxi
Contributing Authors xxiii
Foreword xxix
Modulation Diversity for Wireless Communications: Impact of Channel Estimation Errors and Doppler Effects on System Performance
1(16)
Waslon Terllizzie A. Lopes
Marcelo S. Alencar
Juraci F. Galdino
Introduction
2(2)
The System Model
4(3)
Estimation Algorithms
7(1)
The Amplitude Estimator
8(1)
The Phase Estimator
8(1)
Simulation Results
8(6)
Searching for the Optimum Rotation Angle
9(1)
Impact of the Interleaving Depth on the System Performance
10(1)
Impact of the Estimation Errors on the System Performance
11(3)
Conclusion
14(3)
Performance of Error Control Codes on Finite State Channels via an Enumerative Technique
17(16)
Cecilio Pimentel
Introduction
17(2)
The Communication System
19(1)
Performance Analysis
20(7)
The Effect of Interleaving
24(3)
Performance Bounds for Convolutional Codes
27(3)
Conclusions
30(3)
Bounds on Distance Distributions in Codes of Given Size
33(10)
Gerard Cohen
Michael Krivelevich
Simon Litsyn
Introduction
33(2)
Basic inequalities
35(3)
Distance distributions
38(2)
A Lower Bound
40(3)
Low Density Parity Check Convolutional Codes Derived from Quasi-Cyclic Block Codes
43(12)
Daniel J. Costello Jr.
Arvind Sridharan
Deepak Sridhara
R. Michael Tanner
Introduction
44(1)
Code Construction
44(5)
The Block Codes [3]
44(2)
The Convolutional Codes
46(3)
Decoding
49(1)
Results
50(1)
Conclusions
51(4)
A New Algorithm for Decoding Reed-Solomon Codes
55(14)
Shuhong Gao
Introduction
55(1)
Encoding Reed-Solomon codes
56(1)
Decoding Reed-Solomon codes
57(6)
Decoding with errors and erasures
63(1)
Fast Fourier transforms
64(3)
Conclusions
67(2)
A Noncoherent Detection Scheme for Space-Time Block Codes
69(20)
Hamid Jafarkhani
Introduction
69(2)
Space-Time Block Coding Assuming Coherent Detection
71(8)
The System Model
71(1)
Encoding
72(2)
Decoding
74(5)
Differential Encoding
79(4)
Differential Decoding
83(2)
Conclusions
85(4)
Advances in Quantum Detection
89(34)
Julio I. Concha
H. Vincent Poor
Introduction
89(3)
Quantum-Theoretic Models in Communication Theory
92(6)
Quantum Mechanics
92(1)
States
92(1)
Observables and POVM's
93(2)
Quantum Communications
95(3)
Bayesian Detector Design
98(3)
The Square-Root Detector
101(2)
Pure States
101(1)
Mixed States
102(1)
Unambiguous Discrimination
103(4)
Inverse Channel Detector
107(5)
Detector Design
108(2)
Application to a Multiaccess Problem
110(2)
Some Common Measurements in Quantum Optics
112(2)
Concluding Remarks
114(9)
Toward the True Random Cipher: On Expected Linear Probability Values for SPNs with Randomly Selected S-Boxes
123(24)
Liam Keliher
Henk Meijer
Stafford Tavares
Introduction
124(1)
Substitution-Permutation Networks
125(1)
Linear Probability
125(2)
Linear Cryptanalysis of Markov Ciphers
127(4)
Markov Ciphers
127(1)
Linear Cryptanalysis
128(1)
Notational Issues
129(1)
Linear Characteristics
129(1)
Choosing the Best Characteristic
130(1)
Linear Hulls
130(1)
Maximum Average Linear Hull Probability
131(1)
SPN-Specific Considerations
131(2)
Expected ELP Values over all SPNs
133(6)
Distribution of LP Values for Randomly Selected S-boxes
133(2)
Counting Characteristics
135(1)
Recursive Formulation for Ca,b[A]
136(2)
Main Result
138(1)
Example SPN Structure
139(5)
Evaluating Ca,b[A]
139(2)
Computational Results
141(1)
Generalized Conjecture
142(2)
Conclusions
144(3)
Geometric Constructions of Gallager Codes
147(16)
Shu Lin
Jun Xu
Heng Tang
Yu Kou
Introduction
148(1)
Gallager Codes
148(1)
Construction of Finite Geometry Gallager Codes
149(4)
Construction of Circulant EG-Gallager Codes
153(4)
Construction of Circulant PG-Gallager Codes
157(3)
Conclusion
160(3)
A Call Admission Strategy for Multirate Wideband CDMA Systems
163(18)
Jon W. Mark
Shihua Zhu
Introduction
163(2)
Problem Statement
165(1)
Power Distribution
166(8)
Solving for S
170(1)
Case M = 2
170(1)
Condition for Convergence
171(1)
General Case
172(1)
Asymptotic Case
173(1)
Call Admission Algorithm
174(2)
Numerical Results
176(1)
Conclusions
177(4)
Appendix: Sufficient Condition for λ < 1
178(3)
Average Level Crossing Rate and Average Fade Duration of Diversity Methods
181(24)
Xiaofei Dong
Norman C. Beaulieu
Introduction
181(1)
System Model
182(1)
Level Crossing Rate and Fade Duration of MRC in IID Ricean Fading
183(5)
Level Crossing Rate and Fade Duration of EGC
188(4)
Average LCR and AFD of MRC with non-identical branch powers
192(3)
Average LCR and AFD of SC in Generalized Fading
195(10)
Connection Admission Control for MC-CDMA Systems Supporting Multi-Rate Services
205(24)
Xuemin Shen
Jon W. Mark
Dongmei Zhao
Introduction
206(2)
System Model
208(1)
Power Distribution under Perfect Power Control
209(2)
Power Distribution under Imperfect Power Control
211(3)
Connection Admission Control
214(1)
Grade of Service Performance
215(1)
Numerical Results
216(8)
Conclusions
224(5)
Multiuser Detection and Statistical Mechanics
229(50)
Dongning Guo
Sergio Verdu
Introduction
229(3)
The CDMA Channel and Multiuser Detectors
232(6)
The CDMA Channel
232(1)
Multiuser Detectors: Known Results
233(1)
The Single-user Matched Filter
234(1)
The MMSE Detector
235(1)
The Decorrelator
236(1)
The Optimal Detectors
237(1)
Spectral Efficiency
237(1)
Conditional Mean Estimator and Statistical Mechanics
238(9)
Bayes Retrochannel and Conditional Mean Estimator
238(1)
CDMA Multiuser Detectors
239(1)
The Linear Detectors
240(1)
The Optimal Detectors
241(1)
Preliminaries of Statistical Mechanics
242(2)
Spin Glass and the Bayes Retrochannel
244(1)
Overlap
245(2)
Performance Analysis of Linear Detectors
247(20)
Free Energy
247(11)
Solving the Overlap
258(6)
Arbitrary Energy Distribution
264(1)
Linear Multiuser Detectors
265(1)
The Matched Filter
265(1)
The MMSE Detector
265(1)
The Decorrelator
266(1)
The Optimal Detectors
267(3)
Discussions
270(2)
Spectral Efficiency
272(2)
Conclusions
274(5)
Critical Density Thresholds in Distributed Wireless Networks
279(18)
Bhaskar Krishnamachari
Stephen B. Wicker
Ramon Bejar
Marc Pearlman
Introduction
279(1)
Connectivity in Multi-hop Wireless Networks
280(3)
Theory of Random Graphs
283(2)
Models of Random Graphs with Independence
283(1)
Phase Transitions in Random Graphs
284(1)
Random Graphs in Wireless Networks
285(2)
Density-Critical Transitions in Wireless Networks
287(4)
Neighbor Count
287(1)
Multi-Path Connectivity
287(1)
Partition into Cliques
288(1)
Hamiltonian Cycle
289(1)
Probabilistic Flooding
290(1)
Analysis of Critical Thresholds
291(1)
Conclusions
292(5)
Precoding Techniques for Nonlinear Constant-Envelope Modulations
297(18)
P.H. Wittke
M.A. Low
Introduction
297(1)
General System
298(2)
Precoding
300(2)
Performance Results
302(4)
MMSE Precoding
302(2)
Tomlinson Precoding
304(2)
Conclusions
306(9)
Appendix: Minimum Mean-Square Phase Error Correction
309(3)
Appendix: Iterative Precoding Table Construction
312(3)
Spherically Invariant Random Processes: Theory and Applications
315(18)
Kung Yao
Introduction
315(2)
Theoretical Properties of SIRP
317(4)
Conditional Expectation, Mean-Square Estimation, and Closure of SIRP
319(1)
Detection under SIRP
320(1)
SIRP and Heavy-Tailed Processes
321(1)
Application of SIRP to System Modelings
321(5)
SIRP Modeling of Bandlimited Speech Waveform
322(1)
SIRP Modeling of Radar Clutters
322(1)
SIRP Model of Radio Propagation Disturbances
323(2)
SIRP Modeling in Equalization and Array Processing
325(1)
Generation and Simulation of SIRP
325(1)
Conclusions
326(7)
On Entropy, Information Inequalities, and Groups
333(28)
Raymond W. Yeung
Introduction
333(2)
Entropy Functions and Information Inequalities
335(5)
ITIP --- Machine-Proving of Information Inequalities
340(1)
I-Measure and Information Diagrams
341(5)
Examples of Application
346(9)
Entropy and Groups
355(1)
Conclusions
355(6)
Appendix: The Proof for the Equivalence of the Polymatroidal Axioms and the Basic Inequalities
356(5)
Dynamic Inter-SLA Resources Sharing in Differentiated Services Networks Based on Effective Bandwidth Allocation
361(1)
Yu Cheng
Weihua Zhuang
Introduction
362(2)
Resource Allocation Architecture
364(1)
Inter-Domain Resource Allocation
365(1)
MPLS DiffServ Domain
366(1)
Dynamic Bandwidth Borrowing
367(1)
The Lendable Trunk
367(2)
Bandwidth Borrowing
369(1)
MPLS Rerouting
369(1)
Effective Bandwidth for Assured Services
370(1)
The Partitioned Buffer Model
370(1)
Fluid Model Analysis
371(1)
Effective Bandwidth and Admission Control
372(2)
Numerical Results
374(1)
Throughput Analysis
374(1)
Rerouting Effect
375(2)
Conclusions
377(1)
Appendix: Stationary Analysis of the Two-Trunk Markovian Model
378

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program