Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Communications, Information and Network Security is an excellent reference for both professional and academic researchers in the field of communication. Those working in space-time coding, multiuser detection, and wireless networks will find the book to be of particular use. New and highly original results by leading experts in communication, information theory, and data security are presented. Communications, Information and Network Security is a tribute to the broad and profound work of Ian Blake in the field of communication. All of the contributors have individually and collectively dedicated their work to Professor Blake.
Content Level »Research
Keywords »Modulation - algorithms - calculus - communication - entropy - information theory - model - network - networks - probability - tables
List of Figures. List of Tables. Preface. Contributing Authors. Foreword. 1. Modulation Diversity for Wireless Communications: Impact of Channel Estimation Errors and Doppler Effects on System Performance; W. Terllizzie, et al. 2. Performance of Error Control Codes on Finite State Channels via an Enumerative Technique; C> Pimentel. 3. Bounds on Distance Distributions in Codes of Given Size; G. Cohen, et al. 4. Low Density Parity Check Convolutional Codes Derived from Quasi-Cyclic Block Codes; D.J. Costello Jr. et al. 5. A New Algorithm for Decoding Reed-Solomon Codes; Shuhong Gao. 6. A Noncoherent Detection Scheme for Space-Time Block Codes; H. Jafarkhani. 7. Advances in Quantum Detection; J.I. Concha, H.V. Poor. 8. Toward the True Random Cipher: On Expected Linear Probability Values for SPNs with Randomly Selected S-Boxes; L. Keliher, et al. 9. Geometric Constructions of Gallager Codes; Shu Lin, et al. 10. A Call Admission Strategy for Multirate Wideband CDMA Systems; J.W. Mark, Shihua Zhu. 11. Average Level Crossing Rate and Average Fade Duration of Diversity Methods; Xiaofei Dong, N.C. Beaulieu. 12. Connection Admission Control for MC-CDMA Systems Supporting Multi-Rate Services; Xuemin Shen, et al. 13. Multiuser Detection and Statistical Mechanics; Dongning Guo, S. Verdú. 14. Critical Density Thresholds in Distributed Wireless Networks; B. Krishnamachari, et al. 15. Precoding Techniques for Nonlinear Constant-Envelope Modulations; P.H. Wittke, M.A. Low.16. Spherically Invariant Random Processes: Theoryand Applications; Kung Yao. 17. On Entropy, Information Inequalities, and Groups; R.W. Yeung. 18. Dynamic Inter-SLA Resources Sharing in Differentiated Services Networks Based on Effective Bandwidth Allocation; Yu Cheng, Weihua Zhuang. Appendix: Stationary Analysis of the Two-Trunk Markovian Model.