Signal detection and estimation / (Record no. 175732)

000 -LEADER
fixed length control field 02048 a2200253 4500
003 - CONTROL NUMBER IDENTIFIER
control field Nust
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220817112733.0
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2005048031
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1580530702
040 ## - CATALOGING SOURCE
Transcribing agency Nust
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.3822,BAR
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Barkat, Mourad.
9 (RLIN) 62143
245 10 - TITLE STATEMENT
Title Signal detection and estimation /
Statement of responsibility, etc. Mourad Barkat.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston :
Name of publisher, distributor, etc. Artech House,
Date of publication, distribution, etc. c2005.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 692 p. :
Other physical details ill. ;
Dimensions 24 cm. +
Accompanying material 1 CD-ROM (4 3/4 in.)
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Artech House radar library
9 (RLIN) 28729
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note A protocol's life after attacks (Page-3), Towards flexible credential negotiation protocols (Page-19), Man-in-the-middle in tunnelled authentication protocols (Page-28), Towards a framework for autonomic security protocols (Page-49), Client v. server side protocols, interfaces and storage (Page-63), Guaranteeing access in spite of distributed service-flooding attacks Protocol codesign (Page-106), Enforcing security policies for distributed objects applications (Page-119), Regular SPKI (Page-134), Federated identity-management protocols (Page-153), Enforcing the unenforceable (Page-178), Is the verification problem for cryptographic protocols solved? (Page-183), Secure sessions from weak secrets (Page-190), Panel session : is protocol modelling finished? (Page-213), WAR : wireless anonymous routing (Page-218), Limitations of IPsec policy mechanisms (Page-241), Deniable authenticated key establishment for Internet protocols (Page-255), Protocols for supporting a public key infrastructure in ad hoc networks (Page-274), What we can learn from API security (Page-288), Addressing new challenges by building security protocols around graphs From security protocols to system security (Page-301), Biometrics to enhance smartcard security (Page-324), Blind publication : a copyright library without publication or trust (Page-336).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Estimation theory.
9 (RLIN) 10694
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Radar.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Stochastic processes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Telecommunication Engineering
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Reference
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Price effective from Koha item type Public note
          Military College of Signals (MCS) Military College of Signals (MCS) Reference 12/12/2016 621.3822,BAR MCS32474 12/08/2016 12/12/2016 Reference Almirah No.22, Shelf No.3
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.