Solomon's Code


Book Description

A thought-provoking examination of artificial intelligence and how it reshapes human values, trust, and power around the world. Whether in medicine, money, or love, technologies powered by forms of artificial intelligence are playing an increasingly prominent role in our lives. As we cede more decisions to thinking machines, we face new questions about staying safe, keeping a job and having a say over the direction of our lives. The answers to those questions might depend on your race, gender, age, behavior, or nationality. New AI technologies can drive cars, treat damaged brains and nudge workers to be more productive, but they also can threaten, manipulate, and alienate us from others. They can pit nation against nation, but they also can help the global community tackle some of its greatest challenges—from food crises to global climate change. In clear and accessible prose, global trends and strategy adviser Olaf Groth, AI scientist and social entrepreneur Mark Nitzberg, along with seasoned economics reporter Dan Zehr, provide a unique human-focused, global view of humanity in a world of thinking machines.




Reed-Solomon Codes and Their Applications


Book Description

Reed-Solomon codes provide critical error control for many different types of digital communications systems, including those on the Voyager spacecraft and in CD players. This collection of 13 articles from leading researchers in the field provides a comprehensive overview of the history and practical applications--some never before published--of these important codes.




The Nephilim Protocol


Book Description

Everyone in his life has always seemed to hate him. Chad has never known why, until the day he smashes a wall and breaks a friends jawbone. And then he knows. Descended from the race of the half-angel Nephilim, Chad has massive strength, quick reflexes, and other strange magic abilities. Once, his ancestors were kings, Templars, demigods; using their powers to wield cruel and absolute power over the world. The government keeps their descendants locked up on Attu Island, far off the coast of Alaska, to prevent any of them from resuming their reign of terror.But Chad doesn't want to be a monster, and he doesn't want to die on the island. Fighting against guards, fellow prisoners, and the very elements, Chad and his friends must find a way to escape the prison--and their dark heritage. But at the end of the world, can even an angel escape?




The AI Generation


Book Description

An update edition of Solomon’s Code—now The A.I. Generation—the thought-provoking examination of artificial intelligence and how it reshapes human values, trust, and power around the world. Whether in medicine, money, or love, technologies powered by forms of artificial intelligence are playing an increasingly prominent role in our lives. As we cede more decisions to thinking machines, we face new questions about staying safe, keeping a job and having a say over the direction of our lives. The answers to those questions might depend on your race, gender, age, behavior, or nationality. New AI technologies can drive cars, treat damaged brains and nudge workers to be more productive, but they also can threaten, manipulate, and alienate us from others. They can pit nation against nation, but they also can help the global community tackle some of its greatest challenges—from food crises to global climate change. In clear and accessible prose, global trends and strategy adviser Olaf Groth, AI scientist and social entrepreneur Mark Nitzberg, along with seasoned economics reporter Dan Zehr, provide a unique human-focused, global view of humanity in a world of thinking machines.




Algebraic Codes on Lines, Planes, and Curves


Book Description

The past few years have witnessed significant developments in algebraic coding theory. This book provides an advanced treatment of the subject from an engineering perspective, covering the basic principles and their application in communications and signal processing. Emphasis is on codes defined on the line, on the plane, and on curves, with the core ideas presented using commutative algebra and computational algebraic geometry made accessible using the Fourier transform. Starting with codes defined on a line, a background framework is established upon which the later chapters concerning codes on planes, and on curves, are developed. The decoding algorithms are developed using the standard engineering approach applied to those of Reed-Solomon codes, enabling them to be evaluated against practical applications. Integrating recent developments in the field into the classical treatment of algebraic coding, this is an invaluable resource for graduate students and researchers in telecommunications and applied mathematics.




General Theory of Information Transfer and Combinatorics


Book Description

This book collects 63 revised, full-papers contributed to a research project on the "General Theory of Information Transfer and Combinatorics" that was hosted from 2001-2004 at the Center for Interdisciplinary Research (ZIF) of Bielefeld University and several incorporated meetings. Topics covered include probabilistic models, cryptology, pseudo random sequences, quantum models, pattern discovery, language evolution, and network coding.




A Course in Error-correcting Codes


Book Description

This book is written as a text for a course aimed at advanced undergraduates. Chapters cover the codes and decoding methods that are currently of most interest in research, development, and application. They give a relatively brief presentation of the essential results, emphasizing the interrelations between different methods and proofs of all important results. A sequence of problems at the end of each chapter serves to review the results and give the student an appreciation of the concepts.




Automata, Languages and Programming


Book Description

ICALP 2008, the 35th edition of the International Colloquium on Automata, Languages and Programming, was held in Reykjavik, Iceland, July 7–11, 2008. ICALP is a series of annual conferences of the European Association for Th- reticalComputer Science(EATCS) which ?rsttook placein 1972.This year,the ICALP program consisted of the established Track A (focusing on algorithms, automata,complexityandgames)andTrackB(focusing onlogic,semanticsand theory of programming), and of the recently introduced Track C (focusing on security and cryptography foundations). In response to the call for papers, the Program Committees received 477 submissions, the highest ever: 269 for Track A, 122 for TrackB and 86 for Track C. Out of these, 126 papers were selected for inclusion in the scienti?c program: 70 papers for Track A, 32 for Track B and 24 for Track C. The selection was made by the Program Committees based on originality, quality, and relevance to theoretical computer science. The quality of the manuscripts was very high indeed, and many deserving papers could not be selected. ICALP 2008 consisted of ?ve invited lectures and the contributed papers.




Error-Correction Coding and Decoding


Book Description

This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the book presents the authors’ twenty-five years of research organized into five parts: Part I is concerned with the theoretical performance attainable by using error correcting codes to achieve communications efficiency in digital communications systems. Part II explores the construction of error-correcting codes and explains the different families of codes and how they are designed. Techniques are described for producing the very best codes. Part III addresses the analysis of low-density parity-check (LDPC) codes, primarily to calculate their stopping sets and low-weight codeword spectrum which determines the performance of th ese codes. Part IV deals with decoders designed to realize optimum performance. Part V describes applications which include combined error correction and detection, public key cryptography using Goppa codes, correcting errors in passwords and watermarking. This book is a valuable resource for anyone interested in error-correcting codes and their applications, ranging from non-experts to professionals at the forefront of research in their field. This book is open access under a CC BY 4.0 license.




Code-Based Cryptography


Book Description

This book constitutes the refereed proceedings of the 11th International Conference on Code-Based Cryptography, CBCrypto 2023, held in Lyon, France, during April 22–23, 2023. The 8 full papers included in this book were carefully reviewed and selected from 28 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.