00871nam0-22002891i-450-9900013161204033213-540-50630-6000131612FED01000131612(Aleph)000131612FED0100013161220000920d1990----km-y0itay50------baengTables of Fourier Transforms and Fourier Transforms of DistributionsFritz OberhettingerBerlin [etc.]Springer-Verlag1990VIII, 259 p., 24 cmTrasformate di fourier515.723Oberhettinger,Fritz6716ITUNINARICAUNIMARCBK990001316120403321120-L-229746MA1MA1Tables of Fourier Transforms and Fourier Transforms of Distributions382695UNINAING0103700nam 22007095 450 991025484910332120251113185836.0981-10-5107-010.1007/978-981-10-5107-4(CKB)4100000000587325(DE-He213)978-981-10-5107-4(MiAaPQ)EBC5061640(PPN)204531942(EXLCZ)99410000000058732520170927d2017 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierPredictive Computing and Information Security /by P.K. Gupta, Vipin Tyagi, S.K. Singh1st ed. 2017.Singapore :Springer Nature Singapore :Imprint: Springer,2017.1 online resource (xxi, 162 pages) illustrations981-10-5106-2 Includes bibliographical references.Introduction -- Predictive Computing and Information Security: A Technical Review -- Predictive Computing -- Cloud Based Predictive Computing -- IoT based Predictive Computing -- Information Security -- Cloud Based Information Security -- IoT Based Information Security -- Applications of Predictive Computing -- Appendix.This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art techniques and the design, development and innovative use of technologies for enhancing predictive computing and information security.   Coverage also includes the frameworks for eTransportation and eHealth, security techniques, and algorithms for predictive computing and information security based on Internet-of-Things and Cloud computing. As such, the book offers a valuable resource for graduate students and researchers interested in exploring predictive modeling techniques and architectures to solve information security, privacy and protection issues in future communication.Data protectionData structures (Computer science)Information theoryData miningApplication softwareComputational intelligenceInformation storage and retrieval systemsData and Information SecurityData Structures and Information TheoryData Mining and Knowledge DiscoveryComputer and Information Systems ApplicationsComputational IntelligenceInformation Storage and RetrievalData protection.Data structures (Computer science).Information theory.Data mining.Application software.Computational intelligence.Information storage and retrieval systems.Data and Information Security.Data Structures and Information Theory.Data Mining and Knowledge Discovery.Computer and Information Systems Applications.Computational Intelligence.Information Storage and Retrieval.005.8Gupta P.Kauthttp://id.loc.gov/vocabulary/relators/aut859862Tyagi Vipinauthttp://id.loc.gov/vocabulary/relators/autSingh S.Kauthttp://id.loc.gov/vocabulary/relators/autBOOK9910254849103321Predictive Computing and Information Security2545051UNINA