000 nam a22 7a 4500
999 _c29505
_d29505
008 190527b xxu||||| |||| 00| 0 eng d
020 _a9789811323119
_c(hbk)
082 _a004.36
_bVEM
100 _aVempaty, Aditya
245 _aSecure networked inference with unreliable data sources
260 _aSingapore :
_bSpringer,
_c2018.
300 _axiii,208 p. :
_bill. ;
_c24 cm.
365 _aEURO
_b119.9
_d00
504 _aIncludes bibliographical references.
520 _aThe book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.
650 _aComputer literacy
650 _a​Data processing
650 _aHardware
650 _aInformation technology
650 _aMachine theory
650 _aTelecommunications
650 _aData protection
650 _aComputer security
700 _aKailkhura, Bhavya
_eaut
700 _aVarshney, Pramod K.
_eaut
942 _2ddc
_cBK