Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    gbv_123983037
    Umfang: X, 354 S. , graph. Darst. , 24 cm
    ISBN: 3540566864 , 0387566864
    Serie: Lecture notes in computer science 673
    Anmerkung: Literaturangaben
    Weitere Ausg.: Online-Ausg. Applied algebra, algebraic algorithms and error-correcting codes Berlin [u.a.] : Springer, 1993 ISBN 9783540476306
    Weitere Ausg.: Erscheint auch als Online-Ausgabe Cohen, Gérard Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Berlin, Heidelberg : Springer Berlin Heidelberg, 1993 ISBN 9783540476306
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    RVK:
    Schlagwort(e): Algebra ; Informatik ; Algorithmus ; Fehlerkorrekturcode ; Computeralgebra ; Algebraische Codierung ; Fehlerkorrekturcode ; Konferenzschrift ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9947920886502882
    Umfang: X, 362 p. , online resource.
    ISBN: 9783540476306
    Serie: Lecture Notes in Computer Science, 673
    Inhalt: This volume is the proceedings of the 10th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC 10),held in Puerto Rico, May 1993. The aim of the AAECC meetings is to attract high-level research papers and to encourage cross-fertilization among different areas which share the use of algebraic methods and techniques for applications in the sciences of computing, communications, and engineering. The AAECC symposia are mainly devoted to research in coding theory and computer algebra. The theoryof error-correcting codes deals with the transmission of information in the presence of noise. Coding is the systematic use of redundancy in theformation of the messages to be sent so as to enable the recovery of the information present originally after it has been corrupted by (not too much)noise. Computer algebra is devoted to the investigation of algorithms, computational methods, software systems and computer languages, oriented to scientific computations performed on exact and often symbolic data, by manipulating formal expressions by means of the algebraic rules they satisfy. Questions of complexity and cryptography are naturally linked with both coding theory and computer algebra and represent an important share of the area covered by AAECC.
    Anmerkung: Sequence based methods for data transmission and source compression -- On the apparent duality of the Kerdock and Preparata codes -- Bounds for codes as solutions of extremum problems for systems of orthogonal polynomials -- Systems of algebraic equations solved by means of endomorphisms -- Criteria for sequence set design in CDMA communications -- Using Groebner bases to determine the algebraic and transcendental nature of field extensions: Return of the killer tag variables -- A “Divide and conquer” algorithm for Hilbert-Poincaré series, multiplicity and dimension of monomial ideals -- An efficient algorithm for the sparse mixed resultant -- Some features of binary block codes for correcting asymmetric errors -- Fixed-parameter complexity and cryptography -- A class of algebraic geometric codes from curves in high-dimensional projective spaces -- A new class of sequences: Mapping sequences -- A zero-test and an interpolation algorithm for the shifted sparse polynomials -- Parallelization of quantifier elimination on a workstation network -- Hyperplane sections of fermat varieties in P 3 in char. 2 and some applications to cyclic codes -- Analysis of Coppersmith's block Wiedemann algorithm for the parallel solution of sparse linear systems -- Relations among Lie formal series and construction of symplectic integrators -- Exponential sums as discrete fourier transform with invariant phase functions -- Application of finite fields to memory interleaving -- An elementary proof of a partial improvement to the Ax-Katz Theorem -- Energy functions associated with error-correcting codes -- On determining all codes in semi-simple group rings -- On hyperbolic cascaded Reed-Solomon codes -- Peak-shift and bit error-correction with channel side information in runlength-limited sequences -- On a third order differential equation whose differential Galois group is the simple group of 168 elements -- Approximating the number of error locations within a constant ratio is NP-complete -- Two chosen-plaintext attacks on the Li-Wang joint authentication and encryption scheme -- Some constructions of perfect binary codes.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783540566861
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_9948621684602882
    Umfang: X, 362 p. , online resource.
    Ausgabe: 1st ed. 1993.
    ISBN: 9783540476306
    Serie: Lecture Notes in Computer Science, 673
    Inhalt: This volume is the proceedings of the 10th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC 10),held in Puerto Rico, May 1993. The aim of the AAECC meetings is to attract high-level research papers and to encourage cross-fertilization among different areas which share the use of algebraic methods and techniques for applications in the sciences of computing, communications, and engineering. The AAECC symposia are mainly devoted to research in coding theory and computer algebra. The theoryof error-correcting codes deals with the transmission of information in the presence of noise. Coding is the systematic use of redundancy in theformation of the messages to be sent so as to enable the recovery of the information present originally after it has been corrupted by (not too much)noise. Computer algebra is devoted to the investigation of algorithms, computational methods, software systems and computer languages, oriented to scientific computations performed on exact and often symbolic data, by manipulating formal expressions by means of the algebraic rules they satisfy. Questions of complexity and cryptography are naturally linked with both coding theory and computer algebra and represent an important share of the area covered by AAECC.
    Anmerkung: Sequence based methods for data transmission and source compression -- On the apparent duality of the Kerdock and Preparata codes -- Bounds for codes as solutions of extremum problems for systems of orthogonal polynomials -- Systems of algebraic equations solved by means of endomorphisms -- Criteria for sequence set design in CDMA communications -- Using Groebner bases to determine the algebraic and transcendental nature of field extensions: Return of the killer tag variables -- A "Divide and conquer" algorithm for Hilbert-Poincaré series, multiplicity and dimension of monomial ideals -- An efficient algorithm for the sparse mixed resultant -- Some features of binary block codes for correcting asymmetric errors -- Fixed-parameter complexity and cryptography -- A class of algebraic geometric codes from curves in high-dimensional projective spaces -- A new class of sequences: Mapping sequences -- A zero-test and an interpolation algorithm for the shifted sparse polynomials -- Parallelization of quantifier elimination on a workstation network -- Hyperplane sections of fermat varieties in P 3 in char. 2 and some applications to cyclic codes -- Analysis of Coppersmith's block Wiedemann algorithm for the parallel solution of sparse linear systems -- Relations among Lie formal series and construction of symplectic integrators -- Exponential sums as discrete fourier transform with invariant phase functions -- Application of finite fields to memory interleaving -- An elementary proof of a partial improvement to the Ax-Katz Theorem -- Energy functions associated with error-correcting codes -- On determining all codes in semi-simple group rings -- On hyperbolic cascaded Reed-Solomon codes -- Peak-shift and bit error-correction with channel side information in runlength-limited sequences -- On a third order differential equation whose differential Galois group is the simple group of 168 elements -- Approximating the number of error locations within a constant ratio is NP-complete -- Two chosen-plaintext attacks on the Li-Wang joint authentication and encryption scheme -- Some constructions of perfect binary codes.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783662180082
    Weitere Ausg.: Printed edition: ISBN 9783540566861
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    edoccha_9959186205202883
    Umfang: 1 online resource (X, 362 p.)
    Ausgabe: 1st ed. 1993.
    Ausgabe: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 3-540-47630-X
    Serie: Lecture Notes in Computer Science, 673
    Inhalt: This volume is the proceedings of the 10th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC 10),held in Puerto Rico, May 1993. The aim of the AAECC meetings is to attract high-level research papers and to encourage cross-fertilization among different areas which share the use of algebraic methods and techniques for applications in the sciences of computing, communications, and engineering. The AAECC symposia are mainly devoted to research in coding theory and computer algebra. The theoryof error-correcting codes deals with the transmission of information in the presence of noise. Coding is the systematic use of redundancy in theformation of the messages to be sent so as to enable the recovery of the information present originally after it has been corrupted by (not too much)noise. Computer algebra is devoted to the investigation of algorithms, computational methods, software systems and computer languages, oriented to scientific computations performed on exact and often symbolic data, by manipulating formal expressions by means of the algebraic rules they satisfy. Questions of complexity and cryptography are naturally linked with both coding theory and computer algebra and represent an important share of the area covered by AAECC.
    Anmerkung: Bibliographic Level Mode of Issuance: Monograph , Sequence based methods for data transmission and source compression -- On the apparent duality of the Kerdock and Preparata codes -- Bounds for codes as solutions of extremum problems for systems of orthogonal polynomials -- Systems of algebraic equations solved by means of endomorphisms -- Criteria for sequence set design in CDMA communications -- Using Groebner bases to determine the algebraic and transcendental nature of field extensions: Return of the killer tag variables -- A “Divide and conquer” algorithm for Hilbert-Poincaré series, multiplicity and dimension of monomial ideals -- An efficient algorithm for the sparse mixed resultant -- Some features of binary block codes for correcting asymmetric errors -- Fixed-parameter complexity and cryptography -- A class of algebraic geometric codes from curves in high-dimensional projective spaces -- A new class of sequences: Mapping sequences -- A zero-test and an interpolation algorithm for the shifted sparse polynomials -- Parallelization of quantifier elimination on a workstation network -- Hyperplane sections of fermat varieties in P 3 in char. 2 and some applications to cyclic codes -- Analysis of Coppersmith's block Wiedemann algorithm for the parallel solution of sparse linear systems -- Relations among Lie formal series and construction of symplectic integrators -- Exponential sums as discrete fourier transform with invariant phase functions -- Application of finite fields to memory interleaving -- An elementary proof of a partial improvement to the Ax-Katz Theorem -- Energy functions associated with error-correcting codes -- On determining all codes in semi-simple group rings -- On hyperbolic cascaded Reed-Solomon codes -- Peak-shift and bit error-correction with channel side information in runlength-limited sequences -- On a third order differential equation whose differential Galois group is the simple group of 168 elements -- Approximating the number of error locations within a constant ratio is NP-complete -- Two chosen-plaintext attacks on the Li-Wang joint authentication and encryption scheme -- Some constructions of perfect binary codes. , English
    In: Springer eBooks
    Weitere Ausg.: ISBN 3-540-56686-4
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    edocfu_9959186205202883
    Umfang: 1 online resource (X, 362 p.)
    Ausgabe: 1st ed. 1993.
    Ausgabe: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 3-540-47630-X
    Serie: Lecture Notes in Computer Science, 673
    Inhalt: This volume is the proceedings of the 10th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC 10),held in Puerto Rico, May 1993. The aim of the AAECC meetings is to attract high-level research papers and to encourage cross-fertilization among different areas which share the use of algebraic methods and techniques for applications in the sciences of computing, communications, and engineering. The AAECC symposia are mainly devoted to research in coding theory and computer algebra. The theoryof error-correcting codes deals with the transmission of information in the presence of noise. Coding is the systematic use of redundancy in theformation of the messages to be sent so as to enable the recovery of the information present originally after it has been corrupted by (not too much)noise. Computer algebra is devoted to the investigation of algorithms, computational methods, software systems and computer languages, oriented to scientific computations performed on exact and often symbolic data, by manipulating formal expressions by means of the algebraic rules they satisfy. Questions of complexity and cryptography are naturally linked with both coding theory and computer algebra and represent an important share of the area covered by AAECC.
    Anmerkung: Bibliographic Level Mode of Issuance: Monograph , Sequence based methods for data transmission and source compression -- On the apparent duality of the Kerdock and Preparata codes -- Bounds for codes as solutions of extremum problems for systems of orthogonal polynomials -- Systems of algebraic equations solved by means of endomorphisms -- Criteria for sequence set design in CDMA communications -- Using Groebner bases to determine the algebraic and transcendental nature of field extensions: Return of the killer tag variables -- A “Divide and conquer” algorithm for Hilbert-Poincaré series, multiplicity and dimension of monomial ideals -- An efficient algorithm for the sparse mixed resultant -- Some features of binary block codes for correcting asymmetric errors -- Fixed-parameter complexity and cryptography -- A class of algebraic geometric codes from curves in high-dimensional projective spaces -- A new class of sequences: Mapping sequences -- A zero-test and an interpolation algorithm for the shifted sparse polynomials -- Parallelization of quantifier elimination on a workstation network -- Hyperplane sections of fermat varieties in P 3 in char. 2 and some applications to cyclic codes -- Analysis of Coppersmith's block Wiedemann algorithm for the parallel solution of sparse linear systems -- Relations among Lie formal series and construction of symplectic integrators -- Exponential sums as discrete fourier transform with invariant phase functions -- Application of finite fields to memory interleaving -- An elementary proof of a partial improvement to the Ax-Katz Theorem -- Energy functions associated with error-correcting codes -- On determining all codes in semi-simple group rings -- On hyperbolic cascaded Reed-Solomon codes -- Peak-shift and bit error-correction with channel side information in runlength-limited sequences -- On a third order differential equation whose differential Galois group is the simple group of 168 elements -- Approximating the number of error locations within a constant ratio is NP-complete -- Two chosen-plaintext attacks on the Li-Wang joint authentication and encryption scheme -- Some constructions of perfect binary codes. , English
    In: Springer eBooks
    Weitere Ausg.: ISBN 3-540-56686-4
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    gbv_1649298129
    Umfang: Online-Ressource
    ISBN: 9783540476306
    Serie: Lecture Notes in Computer Science 673
    Weitere Ausg.: ISBN 9783540566861
    Weitere Ausg.: Buchausg. u.d.T. Applied algebra, algebraic algorithms and error-correcting codes Berlin : Springer, 1993 ISBN 3540566864
    Weitere Ausg.: ISBN 0387566864
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    RVK:
    Schlagwort(e): Algebra ; Informatik ; Algorithmus ; Fehlerkorrekturcode ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    UID:
    almafu_9959186205202883
    Umfang: 1 online resource (X, 362 p.)
    Ausgabe: 1st ed. 1993.
    Ausgabe: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 3-540-47630-X
    Serie: Lecture Notes in Computer Science, 673
    Inhalt: This volume is the proceedings of the 10th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC 10),held in Puerto Rico, May 1993. The aim of the AAECC meetings is to attract high-level research papers and to encourage cross-fertilization among different areas which share the use of algebraic methods and techniques for applications in the sciences of computing, communications, and engineering. The AAECC symposia are mainly devoted to research in coding theory and computer algebra. The theoryof error-correcting codes deals with the transmission of information in the presence of noise. Coding is the systematic use of redundancy in theformation of the messages to be sent so as to enable the recovery of the information present originally after it has been corrupted by (not too much)noise. Computer algebra is devoted to the investigation of algorithms, computational methods, software systems and computer languages, oriented to scientific computations performed on exact and often symbolic data, by manipulating formal expressions by means of the algebraic rules they satisfy. Questions of complexity and cryptography are naturally linked with both coding theory and computer algebra and represent an important share of the area covered by AAECC.
    Anmerkung: Bibliographic Level Mode of Issuance: Monograph , Sequence based methods for data transmission and source compression -- On the apparent duality of the Kerdock and Preparata codes -- Bounds for codes as solutions of extremum problems for systems of orthogonal polynomials -- Systems of algebraic equations solved by means of endomorphisms -- Criteria for sequence set design in CDMA communications -- Using Groebner bases to determine the algebraic and transcendental nature of field extensions: Return of the killer tag variables -- A “Divide and conquer” algorithm for Hilbert-Poincaré series, multiplicity and dimension of monomial ideals -- An efficient algorithm for the sparse mixed resultant -- Some features of binary block codes for correcting asymmetric errors -- Fixed-parameter complexity and cryptography -- A class of algebraic geometric codes from curves in high-dimensional projective spaces -- A new class of sequences: Mapping sequences -- A zero-test and an interpolation algorithm for the shifted sparse polynomials -- Parallelization of quantifier elimination on a workstation network -- Hyperplane sections of fermat varieties in P 3 in char. 2 and some applications to cyclic codes -- Analysis of Coppersmith's block Wiedemann algorithm for the parallel solution of sparse linear systems -- Relations among Lie formal series and construction of symplectic integrators -- Exponential sums as discrete fourier transform with invariant phase functions -- Application of finite fields to memory interleaving -- An elementary proof of a partial improvement to the Ax-Katz Theorem -- Energy functions associated with error-correcting codes -- On determining all codes in semi-simple group rings -- On hyperbolic cascaded Reed-Solomon codes -- Peak-shift and bit error-correction with channel side information in runlength-limited sequences -- On a third order differential equation whose differential Galois group is the simple group of 168 elements -- Approximating the number of error locations within a constant ratio is NP-complete -- Two chosen-plaintext attacks on the Li-Wang joint authentication and encryption scheme -- Some constructions of perfect binary codes. , English
    In: Springer eBooks
    Weitere Ausg.: ISBN 3-540-56686-4
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9783540076308?
Meinten Sie 9783540278306?
Meinten Sie 9783540406006?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz