01474oam 2200397 a 450 991070317240332120110329104301.0(CKB)3400000000125174(OCoLC)697884992(EXLCZ)99340000000012517420110121d2011 ua 0engurbn||||a||||txtrdacontentcrdamediacrrdacarrierCongressional Oversight Panel January oversight report[electronic resource] an update on TARP support for the domestic automotive industryWashington :U.S. G.P.O.,2011.1 online resource (iii, 134 pages) illustrations"January 13, 2011."Paper version available for sale by the Supt. of Docs., U.S. G.P.O.Includes bibliographical references.Congressional Oversight Panel January Oversight ReportAutomobile industry and tradeUnited StatesFinanceGlobal Financial Crisis, 2008-2009Financial crisesGovernment policyUnited StatesAutomobile industry and tradeFinance.Global Financial Crisis, 2008-2009.Financial crisesGovernment policyFRCFRCGPOBOOK9910703172403321Congressional Oversight Panel January oversight report3451075UNINA01406nam0 22003013i 450 VAN0010676520240806100732.16888-7125-011-720161102d1990 |0itac50 baitaIT|||| |||||Carteggio Loria-Graziani, 1888-1943a cura di Antonio AllocatiRomaMinistero per i beni culturali e ambientali, Ufficio centrale per i beni archivistici1990XLVII, 489 p.25 cmBiblioteca LauriaIT-IT-CE0105 CONSBL.900M.95411/SLP001VAN000847342001 Pubblicazioni degli archivi di Stato. Fonti210 RomaMinistero per i beni culturali e ambientali, Ufficio centrale per i beni archivistici11RomaVANL000360LoriaAchilleVANV08258768028AllocatiAntonioVANV074295GrazianiAugusto1933-2014VANV003722Ministero per i beni e le attività culturali <editore>VANV110207650ITSOL20250228RICABIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZAIT-CE0105VAN00VAN00106765BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA00CONS BL.900M.954 11 00BL 843 SLP 20161102 Biblioteca LauriaCarteggio Loria-Graziani, 1888-1943201383UNICAMPANIA05525nam 2200745 a 450 991102044650332120200520144314.09781118562819111856281X978129918862412991886219781118562789111856278X97811185631061118563107(CKB)2670000000327615(EBL)1120585(OCoLC)827207718(SSID)ssj0000833735(PQKBManifestationID)11504754(PQKBTitleCode)TC0000833735(PQKBWorkID)10936121(PQKB)10650437(OCoLC)827944824(MiAaPQ)EBC1120585(Perlego)1012687(EXLCZ)99267000000032761520120319d2012 uy 0engur|n|---|||||txtccrNetwork coding /edited by Khaldoun Al AghaLondon ISTE ;Hoboken, N.J. Wiley20121 online resource (306 p.)ISTE ;618Description based upon print version of record.9781848213531 1848213530 Includes bibliography (p. 285-287) and index.Cover; Title Page; Copyright Page; Table of Contents; Chapter 1. Network Coding: From Theory to Practice; 1.1. Introduction; 1.2. Theoretical approach; 1.2.1. Max-flow min-cut; 1.2.2. Admissible code; 1.2.3. Linear code; 1.2.4. Algebraic resolution; 1.2.5. Random code; 1.3. Practical approach; 1.3.1. Topologies; 1.3.1.1. Multihop wireless networks; 1.3.1.2. Cellular networks; 1.3.2. Applications; 1.3.2.1. Network coding and TCP; 1.3.2.2. Network coding and P2P; 1.3.2.3. Network coding with priority; 1.4. Conclusion; 1.5. Bibliography; Chapter 2. Fountain Codes and Network Coding for WSNs2.1. Introduction2.2. Fountain codes; 2.2.1. Generalities; 2.2.2. Families of fountain codes; 2.2.2.1. Random fountain codes; 2.2.2.2. Luby Transform (LT); 2.2.2.3. Raptor code; 2.2.2.4. Code complexity; 2.3. Fountain codes in WSNs; 2.3.1. Implementation; 2.3.2. Protocol of reliability enhancement: ARQs versus fountain codes; 2.3.3. Discharge and overflow; 2.4. Fountain codes and network code for sensor networks; 2.4.1. Impact of network coding on the degree distribution of an LT flow; 2.4.1.1. XOR network coding and LT code; 2.4.2. Design a network code for LT code2.4.2.1. Solutions of network coding2.4.3. Application to multihop sensor networks; 2.4.3.1. Multihop linear networks; 2.4.3.2. Sensor networks; 2.5. Conclusion; 2.6. Bibliography; Chapter 3. Switched Code for Ad Hoc Networks: Optimizing the Diffusion by Using Network Coding; 3.1. Abstract; 3.2. Introduction; 3.3. Diffusion in ad hoc networks; 3.4. Diffusion and network coding; 3.5. Switched code: incorporate erasure codes with network coding; 3.5.1. Definitions; 3.5.2. Coding function of switched code; 3.6. Decoding function of switched code; 3.7. Design and analysis of a new distribution3.7.1. Analysis of switched distribution3.8. Conclusion; 3.9. Bibliography; Chapter 4. Security by Network Coding; 4.1. Introduction; 4.2. Attack models; 4.2.1. A type-II wiretap network; 4.2.2. A nice but curious attacker; 4.3. Security for a wiretap network; 4.4. Algebraic security criteria; 4.4.1. Note on random linear network coding; 4.4.2. Algebraic security; 4.4.3. The algebraic security criterion; 4.4.4. Algorithmic application of the criterion; 4.5. Conclusion; 4.6. Bibliography; Chapter 5. Security for Network Coding; 5.1. Introduction; 5.2. Attack models; 5.2.1. Eavesdroppers5.2.1.1. Internal eavesdroppers5.2.1.2. External eavesdroppers; 5.2.2. Active attackers; 5.2.2.1. Pollution attacks; 5.2.2.2. Flooding attack; 5.2.3. Definition of homomorphic ciphering schemes; 5.2.3.1. Two specific schemes; 5.2.3.2. Completely homomorphic encryption schemes; 5.2.4. Homomorphic encryption and confidentiality in network coding; 5.2.4.1. The case of network coding using XOR; 5.2.4.2. The case of network coding in general; 5.3. Confidentiality; 5.3.1. Alternatives for confidentiality; 5.4. Integrity and authenticity solutions5.4.1. Definitions of homomorphic MAC and homomorphic hash functions Network coding, a relatively new area of research, has evolved from the theoretical level to become a tool used to optimize the performance of communication networks - wired, cellular, ad hoc, etc. The idea consists of mixing "packets" of data together when routing them from source to destination. Since network coding increases the network performance, it becomes a tool to enhance the existing protocols and algorithms in a network or for applications such as peer-to-peer and TCP.This book delivers an understanding of network coding and provides a set of studies showing the improvementISTECoding theoryData transmission systemsComputer networksMathematical modelsCoding theory.Data transmission systems.Computer networksMathematical models.004.6COM043000bisacshAl Agha Khaldoun1636074MiAaPQMiAaPQMiAaPQBOOK9911020446503321Network coding4416511UNINA