Communications, Wireless, and Signal Processing Books 2018
cambridge.org/CWSP
This catalogue contains a selection of our most recent books published on Communications, Wireless and Signal Processing. Please visit our website for a full and searchable listing of all our titles in print. Cambridge University Press advances knowledge, learning and research worldwide.
Useful contacts Book Proposals: Julie Lancashire Jlancashire@cambridge.org All other enquiries: Telephone +44 (0) 1223 312393 Email information@cambridge.org Prices and publication dates are correct at the time of going to press but are subject to alteration without notice. Register for new publication alerts at cambridge.org/alerts Order online now at www.cambridge.org/CWSP
Communications, Wireless and Signal Processing Books 2018
Wave Theory of Information Massimo Franschetti University of California, San Diego An expert guide to the relationship between information theory and the physics of wave propagation, covering stochastic and deterministic approaches, engineering applications, and the universal physical limits of radiation. It is an ideal reference for researchers and graduate students in electrical engineering, physics, and applied mathematics. Contents
1. Introduction; 2. Signals; 3. Functional approximation; 4. Electromagnetic propagation; 5. Deterministic representations; 6. Stochastic representations; 7. Communication technologies; 8. The space-wave number domain; 9. The time-frequency domain; 10. Multiple scattering theory; 11. Noise processes; 12. Information-theoretic quantities; 13. Universal information bounds; Appendix A. Elements of functional analysis; Appendix B. Vector calculus; Appendix C. Methods for the asymptotic evaluation of integrals; Appendix D. Stochastic integration; Appendix E. Special functions; Appendix F. Electromagnetic spectrum; References; Index.
ÂŁ79.99 | $99.99 | Hardback | 9781107022317 January 2018 |247 x 174 mm | 174 b/w illus | 478pp
1
Interference Management in Wireless Networks Fundamental Bounds and the Role of Cooperation Venugopal V. Veeravalli University of Illinois, Urbana-Champaign Aly El Gamal Purdue University, Indiana Focusing on cloud-based Coordinated Multi-Point technology, this expert text describes a new, information-theoretic approach to minimizing interference in 5G wireless networks. It presents a framework that uses advancements in backhaul design, and practical coding schemes based on local cooperation, to deliver increased network speed. Contents
1. Introduction to interference management; 2. System model and sum capacity characterization; 3. Degrees of freedom (DoF) and interference alignment; 4. Iterative algorithms for interference management; 5. DoF with coordinated multipoint (CoMP) transmission; 6. Locally connected channels with CoMP; 7. Backhaul load constraint; 8. Cellular uplink; 9. Dynamic interference management; 10. Recent advances and open problems; Appendix A. Information theory; Appendix B. Algebraic geometry.
ÂŁ79.99 | $99.99 | Hardback | 9781107165007 February 2018 | 247 x 174 mm | 37 b/w illus. 2 tables | 242pp
Order online at cambridge.org/CWSP
2
Communications, Wireless and Signal Processing Books 2018
A Foundation in Digital Communication 2nd Edition
Information Theoretic Security and Privacy of Information Systems
Amos Lapidoth Swiss Federal University (ETH), Zürich
Rafael F. Schaefer Technische Universität Berlin
Fully updated for the second edition, this intuitive yet mathematically rigorous text derives the key results of digital communication from first principles. It includes new chapters on the radar problem and intersymbol interference channels, a more geometric derivation of optimal detection in white Gaussian noise, and over 500 homework problems.
Ashish Khisti University of Toronto
Contents
1. Some essential notation; 2. Signals, integrals, and sets of measure zero; 3. The inner product; 4. The space L2 of energylimited signals; 5. Convolutions and filters; 6. The frequency response of filters and bandlimited signals; 7. Passband signals and their representation; 8. Complete orthonormal systems and the sampling theorem; 9. Sampling real passband signals; 10. Mapping bits to waveforms; 11. Nyquist’s criterion; 12. Stochastic processes: definition; 13. Stationary discrete-time stochastic processes; 14. Energy and power in PAM; 15. Operational power spectral density; 16. Quadrature amplitude modulation; 17. Complex random variables and processes; 18. Energy, power, and PSD in QAM; 19. The univariate Gaussian distribution; 20. Binary hypothesis testing; 21. Multi-hypothesis testing; 22. Sufficient statistics; 23. The multivariate Gaussian distribution; 24. Complex Gaussians and circular symmetry; 25. Continuoustime stochastic processes; 26. Detection in white Gaussian noise; 27. Noncoherent detection and nuisance parameters; 28. Detecting PAM and QAM signals in white Gaussian noise; 29. Linear binary block codes with antipodal signalling; 30. The radar problem; 31. A glimpse at discrete-time signal processing; 32. Intersymbol interference
£69.99 | $84.99 | Hardback | 9781107177321 April 2017 | 253 x 182 x 45 mm | 916pp
Holger Boche Technische Universität München H. Vincent Poor Princeton University, New Jersey Learn how information theoretic approaches can inform the design of more secure information systems and networks with this expert guide. Covering theoretical models, analytical results, and the state of the art in research, it will be of interest to researchers, graduate students, and practitioners working in communications engineering. Contents
Part I. Theoretical Foundations: 1. Effective secrecy: reliability, confusion and stealth; 2. Error free perfect secrecy systems; 3. Secure source coding; 4. Networked secure source coding. Part II. Secure Communication: 5. Secrecy rate Maximization in Gaussian MIMO wiretap channels; 6. MIMO wire-tap channels; 7. MISO wiretap channel with strictly causal CSI: a topological viewpoint; 8. Physical layer security with delayed, hybrid and alternating channel state knowledge; 9. Stochastic orders, alignments, and ergodic secrecy capacity; 10. The discrete memoryless arbitrarily varying wiretap channel; 11. Superactivation as a unique feature of secure communication over arbitrarily varying channels. Part III. Secret Key Generation and Authentication: 12. Multiple secret key generation: information theoretic models and key capacity regions; 13. Secret key generation for physical unclonable functions; 14. Wireless physical layer authentication for the Internet of Things. Part IV. Data Systems and Related Applications: 15. Information theoretic analysis of the performance of biometric authentication systems; 16. Joint privacy and security of multiple biometric systems; 17. Information-theoretic approaches to privacy-preserving information access and dissemination; 18. Privacy in the smart grid: information, control and games; 19. Security in distributed storage systems
£99.99 | $125.00 | Hardback | 9781107132269 June 2017 | 254 x 180 x 29 mm | 133 b/w illus. 9 tables | 578pp
Order online at cambridge.org/CWSP
Communications, Wireless and Signal Processing Books 2018
3
Wireless Physical Layer Network Coding
Synchronization in Digital Communication Systems
Jan Sykora Czech Technical University in Prague
Fuyun Ling Twinclouds Consulting, LLC, San Diego
Alister Burr University of York
Gain the skills needed to develop and implement synchronization functions in digital communication systems with this practical guide. Based on the author’s extensive industrial design experience, and including detailed implementation examples, it provides an excellent toolkit for practicing engineers and graduate students in digital communications.
Leading researchers describe a new, networkaware coding strategy that exploits existing signal interactions to enhance network efficiency, capacity and security. Using a systematic, layered approach, this is an invaluable reference for researchers, graduate students and practising engineers in wireless communications and networking. Contents
Part I. Motivation and General Introduction: 1. Introduction; 2. Wireless physical layer network coding: a gentle introduction. Part II. Fundamental Principles of WPNC: 3. Fundamental principles and system model; 4. Components of WPNC; 5. WPNC in cloud communications. Part III. Design of Source, Relay and Destination Strategies: 6. NCM and hierarchical decoding design for H-MAC; 7. NCM design and processing for parametric channels; 8. NCM design for partial HSI and asymmetric H-MAC; 9. Joint hierarchical interference processing; 10. WPNC in complex stochastic networks; Appendix: background theory and selected fundamentals.
Contents
1. An overview of digital communication systems; 2. Selected topics in detection and estimation theory; 3. Initial acquisition and frame synchronization; 4. Basics of phase lock loop techniques; 5. Carrier synchronization; 6. Timing synchronization; 7. Timing control with digital resampling.
£79.99 | $99.99 | Hardback | 9781107114739 July 2017 | 253 x 176 x 22 mm | 135 b/w illus. | 396
£69.99 | $89.99 | Hardback | 9781107096110 February 2018 | 247 x 174 mm | 90 b/w illus. 5 tables | 338pp
Order online at cambridge.org/CWSP
4
Communications, Wireless and Signal Processing Books 2018
Adversarial Machine Learning Anthony D. Joseph University of California, Berkeley Blaine Nelson Google Benjamin I. P. Rubinstein University of Melbourne J.D. Tygar University of California, Berkeley Combining essential theory and practical techniques for analysing system security, and building robust machine learning in adversarial environments, as well as including case studies on email spam and network security, this complete introduction is an invaluable resource for researchers, practitioners and students in computer security and machine learning. Contents
Part I. Overview of Adversarial Machine Learning: 1. Introduction; 2. Background and notation; 3. A framework for secure learning. Part II. Causative Attacks on Machine Learning: 4. Attacking a hypersphere learner; 5. Availability attack case study: SpamBayes; 6. Integrity attack case study: PCA detector. Part III. Exploratory Attacks on Machine Learning: 7. Privacypreserving mechanisms for SVM learning; 8. Near-optimal evasion of classifiers. Part IV. Future Directions in Adversarial Machine Learning: 9. Adversarial machine learning challenges
‘Data Science practitioners tend to be unaware of how easy it is for adversaries to manipulate and misuse adaptive machine learning systems. This book demonstrates the severity of the problem by providing a taxonomy of attacks and studies of adversarial learning.’ Richard Lippmann, Lincoln Laboratory, Massachusetts Institute of Technology £64.99 | $79.99 | Hardback | 9781107043466 c. July 2018 | 247 x 174 mm | 37 b/w illus. 8 tables | 338pp
Order online at cambridge.org/CWSP
Machine Learning Refined Foundations, Algorithms, and Applications Jeremy Watt Northwestern University, Illinois Reza Borhani Northwestern University, Illinois Aggelos K. Katsaggelos Northwestern University, Illinois Provides a fresh, intuitive approach to machine learning, detailing the fundamental concepts necessary for building projects and conducting research. With colour illustrations, practical realworld examples, and MATLAB-based exercises, it is an essential resource for students and an ideal reference for researchers and practitioners in the field. Contents Introduction
Part I. The Basics:2. Fundamentals of numerical optimization; 3. Knowledge-driven regression; 4. Knowledge-driven classification. Part II. Automatic Feature Design: 5. Automatic feature design for regression; 6. Automatic feature design for classification; 7. Kernels, backpropagation, and regularized cross-validation. Part III. Tools for Large Scale Data: 8. Advanced gradient schemes; 9. Dimension reduction techniques. Part IV. Appendices.
£54.99 | $84.99 | Hardback | 9781107123526 September 2016 | 253 x 179 x 18 mm | 135 colour illus. 3 tables 81 exercises | 298pp
Communications, Wireless and Signal Processing Books 2018
Media and Radio Signal Processing for Mobile Communications Kyunghun Jung Samsung Electronics Russell M. Mersereau Georgia Institute of Technology
Principles of Modern Communication Systems Samuel O. Agbo California Polytechnic State University Matthew N. O. Sadiku Prairie View A & M University, Texas TEXTBOOK
This pioneering guide describes the principles and practice of signal processing in mobile communications systems. Covering multiple generations up to 5G, it outlines network architectures and protocol structures, explains end-to-end signal processing procedures, and emphasizes the economical maximization of service quality and network capacity.
Written for a one-semester course, this highly readable textbook uses an accessible, yet mathematically rigorous, approach. Worked examples, problems, MATLAB-based exercises and practical applications engage students and build their confidence. Figures from the book and a solutions manual, password-protected for instructors, are available online.
Contents
Contents
1. Introduction; 2. Signal processing in TDMA systems; 3. Evolution of TDMA systems; 4. Signal processing in CDMA systems; 5. Evolution of CDMA systems; 6. Signal processing in W-CDMA systems; 7. Evolution of W-CDMA systems; 8. Signal processing in SC-FDMA/OFDMA systems; 9. Evolution of SCFDMA/OFDMA systems; 10. Signal processing in 5G systems.
£95.99 | $120.00 | Hardback | 9781108421034 March 2018 | 247 x 174 mm | 324 b/w illus. 137 tables | 476pp
5
1. Introduction; 2. Signals and systems; 3. Amplitude modulation; 4. Angle modulation; 5. Pulse modulation and transmission; 6. Probability and random processes; 7. Noise in analog communications; 8. Noise in digital communication systems.
‘Agbo and Sadiku have done it: they have written the most impressive textbook in the field of communications! Not only have they achieved the difficult task of being technically accurate, they have also achieved the almost impossible task of being easy for students to understand as well as being a fantastic aid to instructors in the field of communications!’ Charles K. Alexander, Cleveland State University £44.99 | $99.99 | Hardback | 9781107107922 April 2017 | 254 x 195 x 24 mm | 237 b/w illus. 30 tables 266 exercises | 454pp
Order online at cambridge.org/CWSP
6
Communications, Wireless and Signal Processing Books 2018
Three-Tier Shared Spectrum, Shared Infrastructure, and Path to 5G Preston Marshall Describes newly emerging concepts of wireless network deployment and spectrum sharing policy, with detailed analysis of the technical requirements, incentives, and challenges, and a focus on the impact for 5G. Essential reading for communications engineers, policy-makers, regulators, and industry strategic planners. Contents
Part I. Spectrum Sharing Background: 1. Introduction to three tier spectrum sharing; 2. Prior dynamic spectrum sharing regimes. Part II. Three Tier Dynamic Spectrum Models: 3. Key aspects of PCAST recommendations; 4. US FCC CBRS regulations, and other international activity. Part III. Components of a Three Tier Architecture: 5. Three tier spectrum admission control systems; 6. Admission control management of access point devices and their clients; 7. Taxonomy of protection methods to be provided across and within tiers. Part IV. Protection Processes for Incumbents and Peers: 8. General process for database system operation; 9. Protection of incumbent satellite operations; 10. Protection to and from terrestrial access points and point-topoint networks; 11. Protection to and from radar systems; 12. Coexistence between unprotected peer devices. Part V. Example Use of Three Tier Spectrum: 13. Device and network interaction with the spectrum access system; 14. CBRS SAS requirements. Part VI. Future Bands, Network Services, Business Models, and Technology: 15. Potential services and business models enabled by three tier spectrum; 16. Candidate incumbent bands for three tier spectrum sharing; 17. From shared spectrum, to shared infrastructure, to a new model of 5G; 18. Future actions to deploy more three tier spectrum bands and nations; 19. Alternatives to three tier operation; 20. Conclusions and a look ahead. Part VII. Appendices: Appendix A. Terms and acronyms; Appendix B. Symbols; Appendix C. Opportunity cost model of spectrum utilization.
£120.00 | $155.00 | Hardback | 9781107196964 August 2017 | 254 x 179 x 19 mm | 344pp
Order online at cambridge.org/CWSP
Automotive Ethernet 2nd Edition Kirsten Matheus BMW Munich Thomas Königseder BMW Munich Get up to speed with the latest developments in Ethernet in-car networking with this fully revised second edition. Coverage is expanded to include explanations of the 100BASE-T1 PHY and 1000 BASE-T1 PHY technologies, an overview of the new TSN standards, a framework for security in automotive Ethernet, and much, much more. Contents
1. A brief history of ‘Ethernet’ (from a car manufacturer’s perspective); 2. A brief history of in-vehicle networking; 3. A brief history of automotive Ethernet; 4. The physical transmission of Automotive Ethernet; 5. Protocols for automotive Ethernet; 6. Ethernet in automotive system development; 7. Outlook.
£59.99 | $74.99 | Hardback | 9781107183223 July 2017 | 253 x 177 x 19 mm | 106 b/w illus. 37 tables | 312pp
Communications, Wireless and Signal Processing Books 2018
7
Stochastic Geometry Analysis of Cellular Networks
Reliability and Availability Engineering
Bartłomiej Błaszczyszyn INRIA, Paris
Kishor S. Trivedi Duke University, North Carolina
Martin Haenggi University of Notre Dame, Indiana
Andrea Bobbio Università degli Studi del Piemonte Orientale, Italy
Paul Keeler Weierstrass Institute for Applied Analysis and Statistics
Covering both classical and advanced approaches, this comprehensive text describes the techniques used for evaluating the reliability of engineered systems. Including numerous examples, case studies and practice problems, it is the ideal self-study guide for students, researchers and practitioners in engineering and computer science.
Sayandev Mukherjee DOCOMO Innovations, Inc., Palo Alto Achieve faster, more efficient network design and optimization with this comprehensive guide. Presenting the latest analytic methods and results from stochastic geometry for understanding the behaviour of heterogeneous cellular networks, and including practical Long-Term Evolution (LTE) applications, it is ideal for engineers who design wireless communication networks.
Modeling, Analysis, and Applications
Contents
Part I. Stochastic Geometry: 1. Introduction; 2. The role of stochastic geometry in HetNet analysis; 3. A brief course in stochastic geometry; 4. Statistics of received power at the typical location; Part II. SINR Analysis:; 5. Downlink SINR: fundamental results; 6. Downlink SINR: advanced results; 7. Downlink SINR: further extensions; 8. Extensions to non-Poisson models.
Part I. Introduction: 1. Introduction; 2. Dependability evaluation; 3. Dependability metrics defined on a single unit. Part II. NonState-Space Models (Combinatorial Models): 4. Reliability block diagram; 5. Network reliability; 6. Fault tree analysis; 7. State enumeration; 8. Dynamic redundancy. Part III. State-Space Models with Exponential Distributions: 9. Continuous time Markov chain: availability models; 10. Continuous time Markov chain: reliability models; 11. Continuous time Markov chain: queueing systems; 12. Petri nets. Part IV. State-Space Models with Non-Exponential Distributions: 13. Non-homogeneous CTMC; 14. Semi-Markov and Markov regenerative models; 15. Phase type expansion. Part V. Multi-Level Models: 16. Hierarchical models; 17. Fixed-point iteration. Part VI. Case Studies: 18. Case studies.
£80.00 | $120.00 | Hardback | 9781107162587
£64.99 | $79.99 | Hardback | 9781107099500
March 2018 | 247 x 174 mm | 21 b/w illus. 1 table | 214pp
August 2017 | 253 x 179 x 36 mm | 726pp
Contents
Order online at cambridge.org/CWSP
8
Communications, Wireless and Signal Processing Books 2018
Get Funded An Insider’s Guide to Building An Academic Research Program Robert J. Trew North Carolina State University Learn the key principles involved in building an externally funded research program and understand the intricacies of the funding process with this practical guide. Including step-by-step advice on how to build successful relationships with program managers, it is ideal for new faculty members in engineering, the sciences and mathematics. Contents
1. Introduction; 2. A brief history of research funding in the United States; 3. The academic recruitment process: position announcement through performance reviews; 4. Getting started and marketing your research; 5. Know where the money is; 6. Making contact and communicating with program managers and program directors; 7. The proposal; 8. Cautions and other concerns; 9. You’re on your way.
£25.99 | $32.99 | Paperback | 9781107657199 April 2017 | 228 x 152 x 15 mm | 290pp
UAV Network and Communications Kamesh Namuduri University of North Texas Serge Chaumette Université de Bordeaux Jae H. Kim Boeing Research and Technology James P. G. Sterbenz University of Kansas The first book to focus on the communications and networking aspects of UAVs, this valuable resource provides the fundamental knowledge needed to pursue research in the field, covering theory, applications, regulation and deployment policy, and implementation. Ideal for graduate students, researchers, and professionals in communications/ networking. Contents
1. Introduction to UAV systems Jean-Marc Moschetta and Kamesh Namuduri; 2. Air-to-ground and air-to-air data link communication Bertold Van den Bergh and Sofie Pollin; 3. Aerial wi-fi networks Evsen Yanmaz and Samira Hayat; 4. Disruptiontolerant airborne networks and protocols James P. G. Sterbenz, Justin P. Rohrer, Mohammed J. F. Alenazi, Truc Anh N. Nguyen, Egemen K. Çetinkaya, Hemanth Narra, Kamakshi S. Pathapati and Keven Peters; 5. Emulations and field demonstrations Jae H. Kim, Natasha Neogi, Claudiu Danilov and Andres Ortiz; 6. Integrating UAS with NAS: regulatory, technical, and research challenges Natasha Neogi and Arunabha Sen; 7. Safety, security, and privacy aspects in UAV networks Kamesh Namuduri and Damien Sauveron; 8. Collaboration between autonomous drones and swarming Serge Chaumette; 9. Real-world applications Leanne Hanson and Kamesh Namuduri.
£110.00 | $140.00 | Hardback | 9781107115309 November 2017 | 247 x 174 mm | 116 b/w illus. | 270pp
Order online at cambridge.org/CWSP
The new home of academic content Bringing together over 34,000 ebooks and 380 journals Fast, intuitive user-centric design Fully responsive Powerful search functionality
cambridge.org/core
S I G N U P TO
Cambridge Alerts for regular updates and to receive 20% off your next online purchase
www.cambridge.org/alerts For information about our privacy and data protection policy, please visit: http://uk.cambridge.org/privacy
Browse related Journals on APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING AN OPEN ACCESS JOURNAL
www.cambridge.org/sip
cambridge.org/core-engineering