000 -LEADER |
fixed length control field |
nam a22 7a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190527b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9789811323119 |
Terms of availability |
(hbk) |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.36 |
Item number |
VEM |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Vempaty, Aditya |
245 ## - TITLE STATEMENT |
Title |
Secure networked inference with unreliable data sources |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Singapore : |
Name of publisher, distributor, etc |
Springer, |
Date of publication, distribution, etc |
2018. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiii,208 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price type code |
EURO |
Price amount |
119.9 |
Unit of pricing |
00 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references. |
520 ## - SUMMARY, ETC. |
Summary, etc |
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer literacy |
|
Topical term or geographic name as entry element |
Data processing |
|
Topical term or geographic name as entry element |
Hardware |
|
Topical term or geographic name as entry element |
Information technology |
|
Topical term or geographic name as entry element |
Machine theory |
|
Topical term or geographic name as entry element |
Telecommunications |
|
Topical term or geographic name as entry element |
Data protection |
|
Topical term or geographic name as entry element |
Computer security |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kailkhura, Bhavya |
Relator term |
aut |
|
Personal name |
Varshney, Pramod K. |
Relator term |
aut |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |