# krainaksiazek an approximation approach to network information theory 20096040

- znaleziono 22 produkty w 2 sklepach

### Approximation Approach to Network Information Theory now publishers Inc

**Książki / Literatura obcojęzyczna**

The interaction between communication entities, which is unique in the network setting, have been at the root of many difficult challenges in communications and information theory. This monograph advocates a sequential approach to make progress on the network communication problem. In order to do this, the channel (and source) model to capture the essence of the network communication problem are simplified and connected to the original problem. This leads to the concept of approximate characterizations of the channel capacity region and source coding rate regions. Approximate solutions to information theory problems are not new. However, they are by and far isolated results each with its own proof technique. This monograph describes a breakthrough systematic approach with two levels of approximation that can be applied to many problems. It concludes by demonstrating its application to four central problems in network information theory: Relay networks, Interference channels, Multiple descriptions problem, and Joint source-channel coding over networks.

Sklep: Libristo.pl

### Top-Down Network Design CISCO

**Książki / Literatura obcojęzyczna**

Objectives The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer's business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer's requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability. Audience This book is for you if you are an internetworking professional responsible for designing and maintaining medium- to large-sized enterprise networks. If you are a network engineer, architect, or technician who has a working knowledge of network protocols and technologies, this book will provide you with practical advice on applying your knowledge to internetwork design. This book also includes useful information for consultants, systems engineers, and sales engineers who design corporate networks for clients. In the fast-paced presales environment of many systems engineers, it often is difficult to slow down and insist on a top-down, structured systems analysis approach. Wherever possible, this book includes shortcuts and assumptions that can be made to speed up the network design process. Finally, this book is useful for undergraduate and graduate students in computer science and information technology disciplines. Students who have taken one or two courses in networking theory will find Top-Down Network Design, Third Edition, an approachable introduction to the engineering and business issues related to developing real-world networks that solve typical business problems. Changes for the Third Edition Networks have changed in many ways since the second edition was published. Many legacy technologies have disappeared and are no longer covered in the book. In addition, modern networks have become multifaceted, providing support for numerous bandwidth-hungry applications and a variety of devices, ranging from smart phones to tablet PCs to high-end servers. Modern users expect the network to be available all the time, from any device, and to let them securely collaborate with coworkers, friends, and family. Networks today support voice, video, high-definition TV, desktop sharing, virtual meetings, online training, virtual reality, and applications that we can't even imagine that brilliant college students are busily creating in their dorm rooms. As applications rapidly change and put more demand on networks, the need to teach a systematic approach to network design is even more important than ever. With that need in mind, the third edition has been retooled to make it an ideal textbook for college students. The third edition features review questions and design scenarios at the end of each chapter to help students learn top-down network design. To address new demands on modern networks, the third edition of Top-Down Network Design also has updated material on the following topics: ' Network redundancy ' Modularity in network designs ' The Cisco SAFE security reference architecture ' The Rapid Spanning Tree Protocol (RSTP) ' Internet Protocol version 6 (IPv6) ' Ethernet scalability options, including 10-Gbps Ethernet and Metro Ethernet ' Network design and management tools

Sklep: Libristo.pl

### IPSEC Virtual Private Network Fundamentals CISCO

**Książki / Literatura obcojęzyczna**

An introduction to designing and configuring Cisco IPsec VPNs * Understand the basics of the IPsec protocol and learn implementation best practices * Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace * Learn how to avoid common pitfalls related to IPsec deployment * Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms. It provides the foundation necessary to understand the different components of Cisco IPsec implementation and how it can be successfully implemented in a variety of network topologies and markets (service provider, enterprise, financial, government). This book views IPsec as an emerging requirement in most major vertical markets, explaining the need for increased information authentication, confidentiality, and non-repudiation for secure transmission of confidential data. The book is written using a layered approach, starting with basic explanations of why IPsec was developed and the types of organizations relying on IPsec to secure data transmissions. It then outlines the basic IPsec/ISAKMP fundamentals that were developed to meet demand for secure data transmission. The book covers the design and implementation of IPsec VPN architectures using an array of Cisco products, starting with basic concepts and proceeding to more advanced topics including high availability solutions and public key infrastructure (PKI). Sample topology diagrams and configuration examples are provided in each chapter to reinforce the fundamentals expressed in text and to assist readers in translating concepts into practical deployment scenarios. Additionally, comprehensive case studies are incorporated throughout to map topics to real-world solutions.

Sklep: Libristo.pl

### Algorithmic Aspects in Information and Management Springer, Berlin

**Książki / Literatura obcojęzyczna**

This book constitutes the refereed proceedings of the 4th International Conference on Algorithmic Aspects in Information and Management, AAIM 2008, held in Shanghai, China, in June 2008.§The 30 revised full papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 53 submissions. The papers cover original algorithmic research on immediate applications and/or fundamental problems pertinent to information management and management science. Topics addressed are: approximation algorithms, geometric data management, biological data management, graph algorithms, computational finance, mechanism design, computational game theory, network optimization, data structures, operations research, discrete optimization, online algorithms, FPT algorithms, and scheduling algorithms.

Sklep: Libristo.pl

### Source Coding Theory Springer, Berlin

**Książki / Literatura obcojęzyczna**

Source coding theory has as its goal the characterization of the optimal performance achievable in idealized communication systems which must code an information source for transmission over a digital communication or storage channel for transmission to a user. The user must decode the information into a form that is a good approximation to the original. A code is optimal within some class if it achieves the best possible fidelity given whatever constraints are imposed on the code by the available channel. In theory, the primary constraint imposed on a code by the channel is its rate or resolution, the number of bits per second or per input symbol that it can transmit from sender to receiver. In the real world, complexity may be as important as rate. The origins and the basic form of much of the theory date from Shan non's classical development of noiseless source coding and source coding subject to a fidelity criterion (also called rate-distortion theory) [73] [74]. Shannon combined a probabilistic notion of information with limit theo rems from ergodic theory and a random coding technique to describe the optimal performance of systems with a constrained rate but with uncon strained complexity and delay. An alternative approach called asymptotic or high rate quantization theory based on different techniques and approx imations was introduced by Bennett at approximately the same time [4]. This approach constrained the delay but allowed the rate to grow large.

Sklep: Libristo.pl

### New Trends in Nanotechnology and Fractional Calculus Springer Verlag

**Dla dzieci**

In recent years fractional calculus has played an important role in various fields such as mechanics, electricity, chemistry, biology, economics, modeling, identification, control theory and signal processing. The scope of this book is to present the state of the art in the study of fractional systems and the application of fractional differentiation. Furthermore, the manufacture of nanowires is important for the design of nanosensors and the development of high-yield thin films is vital in procuring clean solar energy. This wide range of applications is of interest to engineers, physicists and mathematicians.Table of contentsPreface;New trends in nanotechnology: Novel Molecular Diodes Developed by Chemial Conjugation of Carbon Nanotubes with Peptide Nucleic Acid, by Krishna V. Singh, Miroslav Penchev, Xiaoye Jing, Alfredo A. Martinez-Morales, Cengiz S. Ozkan and Mihri Ozkan;Hybrid Single Walled Carbon Nanotube FETs for High Fidelity DNA Detection, by Xu Wang, Mihri Ozkan, Gurer Budak, Ziya B. Guvenc and Cengiz S. Ozkan;Towards integrated nanoelectronic and photonic devices, by Alexander Quandt, Maurizio Ferrari and Giancarlo C. Righini;New noninvasive methods for

Sklep: Albertus.pl

### Elementary Physicochemical Processes on Solid Surfaces, 1 Springer, Berlin

**Książki / Literatura obcojęzyczna**

vi industrial process or a class of catalysts forms the basis of other books, with information on: fundamental science of the topic, the use of the pro cess or catalysts, and engineering aspects. Single topics in catalysis are also treated in the series, with books giving the theory of the underlying science, and relating it to catalytic practice. We believe that this approach is giving a collection of volumes that is of value to both academic and industrial workers. The series editors welcome comments on the series and suggestions of topics for future volumes. Martyn Twigg Michael Spencer Billingham and Cardiff Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . 1 . . . . . . . . Chapter 1. Vibrational Relaxation of Adsorbed Particles . . . .. . 5 1.1. General Approach to Describing Vibrational Relaxation ..... 5 1.2. Phonon Mechanism of Relaxation .................... 8 1.2.1. Relationship between the Simple Perturbation Theory and the Adiabatic Approximation .. . . . . . . . . . .. . . 9 . 1.2.2. One-Mode Approximation .................. . .. 11 1.2.3. Relaxation Caused by Correlation Potential Proportional to Displacement of Adsorbed Particle from Equilibrium ........................... 12 1.2.4. Relaxation Caused by Correlation Potential Proportional to Displacement of Surface Atom from Equilibrium ........................... 14 1.2.5. Results and Discussion ....................... 15 1.3. Vibrational Relaxation via Interaction with Conduction Electrons . . . . . . . . . . . . . . . . . . . . . . . . . .. . . 18 . . . . . . . . . 1.3.1. Dipole Approximation ......... '.' . . . . . . . . .. . . 18 .

Sklep: Libristo.pl

### Machine learning Books on Demand

**Książki / Literatura obcojęzyczna**

Source: Wikipedia. Pages: 254. Chapters: Artificial neural network, Supervised learning, Hidden Markov model, Pattern recognition, Reinforcement learning, Principal component analysis, Self-organizing map, Overfitting, Cluster analysis, Granular computing, Rough set, Mixture model, Expectation-maximization algorithm, Radial basis function network, Types of artificial neural networks, Learning to rank, Forward-backward algorithm, Perceptron, Category utility, Neural modeling fields, Dominance-based rough set approach, Principle of maximum entropy, Non-negative matrix factorization, Concept learning, K-means clustering, Structure mapping engine, Viterbi algorithm, Cross-validation, Hierarchical temporal memory, Activity recognition, Algorithmic inference, Formal concept analysis, Gradient boosting, Information bottleneck method, Nearest neighbor search, Simultaneous localization and mapping, Markov decision process, Gittins index, K-nearest neighbor algorithm, General Architecture for Text Engineering, Reasoning system, Concept drift, Uniform convergence, Conceptual clustering, Multi-armed bandit, Multilinear subspace learning, Conditional random field, DBSCAN, Feature selection, Learning with errors, Weka, Evolutionary algorithm, Iris flower data set, Binary classification, OPTICS algorithm, Partially observable Markov decision process, Constrained Conditional Models, Group method of data handling, Learning classifier system, Random forest, Statistical classification, Analogical modeling, Bregman divergence, Backpropagation, Temporal difference learning, Loss function, Curse of dimensionality, Alternating decision tree, Evolutionary multi-modal optimization, Stochastic gradient descent, Kernel principal component analysis, Explanation-based learning, K-medoids, RapidMiner, Transduction, Variable-order Markov model, Kernel adaptive filter, Classification in machine learning, Grammar induction, Sense Networks, Glivenko Cantelli theorem, Cross-entropy method, Dimension reduction, Rand index, Spiking neural network, Feature Selection Toolbox, Co-training, Multinomial logit, Computational learning theory, Local Outlier Factor, Q-learning, Gaussian process, Evolvability, Universal Robotics, Crossover, Shattering, Cluster-weighted modeling, Version space, Variable kernel density estimation, Calibration, Randomized weighted majority algorithm, Leabra, Growing self-organizing map, TD-Gammon, Prior knowledge for pattern recognition, Generative topographic map, VC dimension, ID3 algorithm, String kernel, Prefrontal Cortex Basal Ganglia Working Memory, Meta learning, Inductive transfer, Margin classifier, Active learning, Feature extraction, Regularization, IDistance, Dynamic time warping, Latent variable, Layered hidden Markov model, Empirical risk minimization, Jabberwacky, Inductive bias, Shogun, Confusion matrix, Never-Ending Language Learning, Accuracy paradox, FLAME clustering, Smart variables, Probably approximately correct learning, Hierarchical hidden Markov model, Document classification, Adjusted mutual information, Generalization error, Knowledge discovery, Quadratic classifier, Ugly duckling theorem, Bongard problem, Online machine learning, Algorithmic learning theory, Information Fuzzy Networks, Knowledge integration, Bootstrap aggregating, Early stopping, Kernel methods, Bag of words model, CIML community portal, Sequence labeling, Semi-supervised learning, Minimum redundancy feature selection, Matthews correlation coefficient, Learn...

Sklep: Libristo.pl

### Piecewise Linear Modeling and Analysis Springer, Berlin

**Książki / Literatura obcojęzyczna**

Piecewise Linear (PL) approximation of non-linear behaviour is a well-known technique in synthesis and analysis of electrical networks. However, the PL description should be efficient in data storage and the description should allow simple retrieval of the stored information. Furthermore, it would be useful if the model description could handle a large class of piecewise linear mappings. Piecewise Linear Modeling and Analysis explains in detail all possible model descriptions for efficiently storing piecewise linear functions, starting with the Chua descriptions. Detailed explanation on how the model parameter can be obtained for a given mapping is provided and demonstrated by examples. The models are ranked to compare them and to show which model can handle the largest class of PL mappings. All model descriptions are implicitly related to the Linear Complementarity Problem and most solution techniques for this problem, like Katzenelson and Lemke, are discussed according to examples that are explained in detail. To analyse PL electrical networks a simulator is mandatory. Piecewise Linear Modeling and Analysis provides a detailed outline of a possible PL simulator, including pseudo-programming code. Several simulation domains like transient, AC and distortion are discussed. The book explains the attractive features of PL simulators with respect to mixed-level and mixed-signal simulation while paying due regard also to hierarchical simulation. Piecewise Linear Modeling and Analysis shows in detail how many existing components in electrical networks can be modeled. These range from digital logic and analog basic elements such as transistors to complex systems like Phase-Locked Loops and detection systems. Simulation results are also provided. The book concludes with a discussion on how to find multiple solutions for PL functions or networks. Again, the most common techniques are outlined using clear examples. Piecewise Linear Modeling and Analysis is an indispensable guide for researchers and designers interested in network theory, network synthesis and network analysis.

Sklep: Libristo.pl

### Managing Security with Snort & IDS Tools O'Reilly Media, Inc, USA

**Książki / Literatura obcojęzyczna**

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you? Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools. This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices. Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.

Sklep: Libristo.pl

### Random Networks for Communication Cambridge University Press

**Książki / Literatura obcojęzyczna**

When is a random network (almost) connected? How much information can it carry? How can you find a particular destination within the network? And how do you approach these questions - and others - when the network is random? The analysis of communication networks requires a fascinating synthesis of random graph theory, stochastic geometry and percolation theory to provide models for both structure and information flow. This book is the first comprehensive introduction for graduate students and scientists to techniques and problems in the field of spatial random networks. The selection of material is driven by applications arising in engineering, and the treatment is both readable and mathematically rigorous. Though mainly concerned with information-flow-related questions motivated by wireless data networks, the models developed are also of interest in a broader context, ranging from engineering to social networks, biology, and physics.

Sklep: Libristo.pl

### MIMO Wireless Networks Elsevier Science & Technology

**Książki / Literatura obcojęzyczna**

Unique in explaining the principles of MIMO networks at both link and system levels: now updated to include the latest developments in multi-user and multi-cell ???? channels and techniques, key developments for the developments of 4G networks!§This book is unique in bridging the gap between MIMO radio propagation and signal processing techniques and presenting robust MIMO network designs for real-world wireless channels. Through a unified framework, it emphasizes how propagation mechanisms impact the MIMO system performance under realistic power constraints. Combining a solid mathematical analysis with a physical and intuitive approach, the book progressively derives innovative designs, taking into consideration that MIMO channels are often far from ideal.§Reflecting developments since the first edition was published the book has been updated and now includes several new chapters, covering Multi-user MIMO, Multi-Cell MIMO, Receiver Design, MIMO in 3GPP and WiMAX and realistic system level evaluations of MIMO networks performance.§Features include: . Physical models and analytical representations of single-link and multi-link MIMO propagation channels, highlighting the strengths and weaknesses of various models . Overview of space-time coding techniques, covering both classical and more recent schemes under information theory and error probability perspectives . In-depth presentation of how real-world propagation affects the capacity and the error performance of MIMO transmission schemes . Innovative and practical designs of robust space-time coding, precoding and limited feedback techniques for realistic propagation (including single-carrier and MIMO-OFDM transmissions) . Overview of popular MIMO receiver architectures . Multi-user diversity and resource allocation schemes in OFDMA networks as well as linear and non-linear MU-MIMO techniques under ideal and non-ideal channel knowledge . Extensive coverage of cooperative multi-cell MIMO-OFDMA networks, including network resource allocation optimization, coordinated scheduling, beamforming and power control, interference alignment, joint processing and network MIMO . Applications of MIMO and Coordinated Multi-Point (CoMP) in LTE, LTE-A and WiMAX. Theoretical derivations and results contrasted with practical system level evaluations highlighting the performance of single-cell and multi-cell MIMO techniques in realistic deployments. §Physical models and analytical representations of MIMO propagation channels, highlighting the strengths and weaknesses of various models §Overview of space-time coding techniques, covering both classical and more recent schemes under information theory and error probability perspectives §In-depth presentation of how real-world propagation affects the capacity and the error performance of MIMO transmission schemes §Innovative and practical designs of robust space-time coding, precoding and antenna selection techniques for realistic propagation (including single-carrier and MIMO-OFDM transmissions)§

Sklep: Libristo.pl

### Communication Complexity and Parallel Computing Springer, Berlin

**Książki / Literatura obcojęzyczna**

This book is devoted to the investigation of a special topic in theoretical computer science - communication complexity as an abstract measure of the complexity of computing problems. Its main aim is to show how the theoretical study of communication complexity can be useful in the process of designing effective parallel algorithms. The author shows how to get important information about the parallel complexity (parallel time, the number of processors, the descriptional complexity of the topology of the parallel architecture) of specific computing problems from knowledge of their communication complexity. The book is written as a textbook for undergraduate and graduate students and provides a careful explanation of the subject as well as motivation for further research. There are several approaches to attack hard problems. All have their merits, but also their limitations, and need a large body of theory as their basis. A number of books for each one exist: books on complexity theory, others on approximation algorithms, heuristic approaches, parametrized complexity, and yet others on randomized algorithms. This book discusses thoroughly all of the above approaches. And, amazingly, at the same time, does this in a style that makes the book accessible not only to theoreticians, but also to the non-specialist, to the student or teacher, and to the programmer. Do you think that mathematical rigor and accessibility contradict? Look at this book to find out that they do not, due to the admirable talent of the author to present his material in a clear and concise way, with the idea behind the approach spelled out explicitly, often with a revealing example. Reading this book is a beautiful experience and I can highly recommend it to anyone inte rested in learning how to solve hard problems. It is not just a condensed union of material from other books. Because it discusses the different approaches in depth, it has the chance to compare them in detail, and, most importantly, to highlight under what circumstances which appro- ach might be worth exploring. No book on a single type of solution can do that, but this book does it in an absolutely fasci- nating way that can serve as a pattern for theory textbooks with a high level of generality. (Peter Widmayer) The second edition extends the part on the method of relaxation to linear programming with an emphasis on rounding, LP-duality, and primal-dual schema, and provides a self-contained and trans- parent presentation of the design of randomized algorithms for primality testing.

Sklep: Libristo.pl

### The Telecommunications Handbook Wiley & Sons

**Książki / Literatura obcojęzyczna**

This practical handbook and reference provides a complete understanding of the telecommunications field supported by descriptions and case examples throughout§Taking a practical approach, The Telecommunications Handbook examines the principles and details of all of the major and modern telecommunications systems currently available to industry and to end-users. It gives essential information about usage, architectures, functioning, planning, construction, measurements and optimisation. The structure of the book is modular, giving both overall descriptions of the architectures and functionality of typical use cases, as well as deeper and practical guidelines for telecom professionals.§The focus of the book is on current and future networks, and the most up-to-date functionalities of each network are described in sufficient detail for deployment purposes. The contents include an introduction to each technology, its evolution path, feasibility and utilization, solution and network architecture, and technical functioning of the systems (signalling, coding, different modes for channel delivery and security of core and radio system). The planning of the core and radio networks (system-specific field test measurement guidelines, hands-on network planning advices and suggestions for the parameter adjustments) and future systems are also described.§Each chapter covers aspects individually for easy reference, including approaches such as: functional blocks, protocol layers, hardware and software, planning, optimization, use cases, challenges, solutions to potential problems§Provides very practical detail on the planning and operation of networks to enable readers to apply the content in real-world deployments§Bridges the gap between the communications in the academic context and the practical knowledge and skills needed to work in the telecommunications industry§Section divisions include: General theory; Fixed telecommunications; Mobile communications; Space communications; Other and special communications; and Planning and management of telecommunication networks§Covers new commercial and enhanced systems deployed, such as IPv6 based networks, LTE-Advanced and GALILEO§An essential reference for Technical personnel at telecom operators; equipment and terminal manufacturers; Engineers working for network operators.

Sklep: Libristo.pl

### Migrating to Ipv6 BLACKWELL PUBLISHERS

**Książki / Literatura obcojęzyczna**

This book helps readers to understand IPv6, the protocol essential to future Internet growth. Exhaustion of address space and global routing table growth necessitate important revisions to the current version of the Internet Protocol, IPv4. IP version 6 offers greater address space and additional features to support the evolving requirements of Internet applications. Deployed alongside current IPv4 networks, IPv6 will restore the full-fledge network necessary for Internet growth. Migrating to IPv6 gives a comprehensive overview of IPv6 and related protocols, the layers below IPv6 to the application and end-user layers.Author Marc Blanchet offers a direct and clear route to understanding the topic, taking a top-down approach and ordering topics by relevance. Tried and tested practical techniques and advice on implementation, applications and deployment provide 'how-to' information on everything you need to know to put the technology to work. "Migrating to IPv6" provides a complete, up-to-date, in-depth, and accessible practical guide to IPv6. It demonstrates the theory with practical and generic examples and major implementation configurations, such as Windows, FreeBSD, Linux, Solaris, Cisco, Juniper and Hexago. It provides a comprehensive reference to key data structures and packet formats.It summarizes topics in table and graphical form to give fast access to information, including over 200 figures. It offers an accompanying website with extra coverage of specific topics, information on additional protocols and specifications, and updates on new features. This text will give network engineers, managers and operators, software engineers and IT professionals and analysts a thorough understanding of IPv6.

Sklep: Libristo.pl

## szukaj w Kangoo krainaksiazek an approximation approach to network information theory 20096040

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

# Szukaj w sklepach lub całym serwisie

## 1. Sklepy z krainaksiazek pl an approximation approach to network information theory 20096040

2. Szukaj na wszystkich stronach serwisu

t1=0.137, t2=0, t3=0, t4=0.022, t=0.137