1 - 20
Next
- 250th Anniversary Conference on Graph Theory (1986 : Indiana University-Purdue University at Fort Wayne)
- Winnipeg, Canada : Utilitas Mathematica Pub., c1988.
- Description
- Book — 2 v. : ill. ; 23 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks
|
Request (opens in new tab) |
QA166 .T86 1986 V.1 | Available |
QA166 .T86 1986 V.2 | Available |
2. A. Haar memorial conference [1987]
- A. Haar Memorial Conference (1985 : Budapest, Hungary)
- Amsterdam ; New York : North-Holland ; New York, N.Y., U.S.A. : Elsevier Science Pub. Co., c1987.
- Description
- Book — 2 v. (1018 p.) : ill. ; 24 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks
|
Request (opens in new tab) |
QA7 .A46 1985 V.1 | Available |
QA7 .A46 1985 V.2 | Available |
- A4MMC (1st : 2010 : Saint-Malo, France)
- Berlin ; New York : Springer, ©2011.
- Description
- Book — 1 online resource (xxvii, 378 pages) Digital: text file; PDF.
- Summary
-
- Accelerating Agent-Based Ecosystem Models Using the Cell Broadband Engine
- Performance Impact of Task Mapping on the Cell BE Multicore Processor
- Parallelization Strategy for CELL TV
- Towards User Transparent Parallel Multimedia Computing on GPU-Clusters
- Implementing a GPU Programming Model on a Non-GPU Accelerator Architecture
- On the Use of Small 2D Convolutions on GPUs
- Can Manycores Support the Memory Requirements of Scientific Applications?
- Parallelizing an Index Generator for Desktop Search
- Computation vs. Memory Systems: Pinning Down Accelerator Bottlenecks
- Trace Execution Automata in Dynamic Binary Translation
- ISAMAP: Instruction Mapping Driven by Dynamic Binary Translation
- Parallelization of Particle Filter Algorithms
- What Kinds of Applications Can Benefit from Transactional Memory?
- Characteristics of Workloads Using the Pipeline Programming Model
- The Search for Energy-Efficient Building Blocks for the Data Center
- KnightShift: Shifting the I/O Burden in Datacenters to Management Processor for Energy Efficiency
- Guarded Power Gating in a Multi-core Setting
- Using Partial Tag Comparison in Low-Power Snoop-Based Chip Multiprocessors
- Achieving Power-Efficiency in Clusters without Distributed File System Complexity
- What Computer Architects Need to Know about Memory Throttling
- Predictive Power Management for Multi-core Processors
- IOMMU: Strategies for Mitigating the IOTLB Bottleneck
- Improving Server Performance on Multi-cores via Selective Off-Loading of OS Functionality
- Performance Characteristics of Explicit Superpage Support
- Interfacing Operating Systems and Polymorphic Computing Platforms Based on the MOLEN Programming Paradigm
- Extrinsic and Intrinsic Text Cloning
- A Case for Coordinated Resource Management in Heterogeneous Multicore Platforms
- Topology-Aware Quality-of-Service Support in Highly Integrated Chip Multiprocessors.
- AAAI Spring Symposium (2010 : Stanford University)
- Menlo Park, Calif. : AAAI Press, c2010.
- Description
- Book — ix, 202 p. : ill. ; 28 cm.
- Summary
-
- Preface / Michael Genesereth, Roland Vogl, and Mary-Anne Williams
- Combining privacy and security risk assessment in security quality requirements engineering / Saeed Abu-Nimeh and Nancy R. Mead
- Information privacy and its value / Sabah Al-Fedaghi
- Privacy and international compliance : when differences become an issue / Dennys Antonialli
- Consumers : the missing piece in a piecemeal approach to privacy / Clark D. Asay
- Privacy in online social lending / Rainer Böhme and Stefanie Pötzsch
- Position and perspective of privacy laws in India / Bijan Brahmbhatt
- Ontological semantics for data privacy compliance : the NEURONA Project / Núria Casellas, Juan-Emilio Nieto, Albert Moroño, Antoni Roig, Sergi Torralba, Mario Reyes, and Pompeu Casanovas
- The distinction between "privacy" and "personal information"--issues of Personal Information Protection Act in Japan / Yeyoung Chang
- Modeling privacy requirements for quality manipulation of information on social networking sites / Shan Chen and Mary-Anne Williams
- The web as a privacy lab / Richard Chow, Ji Fang, Philippe Golle, and Jessica Staddon
- The right to delete / Chris Conley
- Search query privacy : the problem of anonymization / Ron A. Dolin
- Radio frequency identification tags, memory spots, and the processing of personally identifiable information, and sensitive data: when there is no balance between right and wrong / Luca Escoffier
- Reasoning about the appropriate use of private data through computational workflows / Yolanda Gil and Christian Fritz
- Geospatial information services : balancing privacy and innovation / Nathaniel Jurist Gleicher and Jong Sung Hwang
- Personalized privacy policies : challenges for data loss prevention / Nathan Gnanasambandam and Jessica Staddon
- Influence of the "internet of things" on legislation regarding the protection of individual privacy / Jean-François Henrotte
- Privacy classification systems : recall and precision optimization as enabler of trusted information sharing / Christopher Hogan and Robert S. Bauer
- Application of an autonomous intelligent cyber entity as a veiled identity agent / Eran Kahana
- Enabling privacy-awareness in social networks / Ted Kang and Lalana Kagal
- Mandatory enforcement of privacy policies using trusted computing principles / Frank Kargl, Florian Schaub, and Stefan Dietzel
- Wrap contracts and privacy / Nancy S. Kim
- Towards territorial privacy in smart environments / Bastian Könings, Florian Schaub, Michael Weber, and Frank Kargl
- Engineering privacy in an age of information abundance / Betsy Masiello and Alma Whitten
- Privacy and transparency / G. Randolph Mayes
- Privacy codes of practice for the social web : the analysis of existing privacy codes and emerging social-centric privacy risks / Girma Nigusse and Bart De Decker
- Protecting reader privacy in digital books / Nicole A. Ozer and Jennifer A. Lynch
- Mobile networks and conflict management : farewell to privacy? / Marta Poblet and Sergi Torralba
- Privacy and social networks : from data protection to pervasive computing / Antoni Roig
- Forensic DNA profiles : database expansion, familial search, and a radical solution / Michael R. Seringhaus
- The problem of onward transfers under U.S. law / Raghu Seshadri
- Flash cookies and privacy / Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas and Chris Jay Hoofnagle
- Cloud privacy : normative standards for information privacy management within cloud computing / Robert Sprague
- How teenagers deal with their privacy on social network sites? : results from a national survey in France / Thomas Stenger and Alexandre Coutant
- Self-regulation and policy in the Spanish audiovisual sector : the Catalan code of best practices / Emma Teodoro, Núria Galera, and Pompeu Casanovas
- Protecting information privacy on the internet : legal framework in the EU / Faye Fangfei Wang
- Privacy in cross-system personalization / Yang Wang and Alfred Kobsa
- Pre-processing legal text : policy parsing and isomorphic intermediate representation / K. Krasnow Waterman
- Selective privacy in a web-based world: challenges of representing and inferring context / K. Krasnow Waterman, Deborah L. McGuinness, and Li Ding
- The privacy paradox, or how I learned to have rights that never quite seem to work / Raffaele Zallone.
- Online
Law Library (Crown)
Law Library (Crown) | Status |
---|---|
Basement | Request (opens in new tab) |
QA76.9 .A25 A17 2010 | Unknown |
- Aaberg, Claes.
- Uppsala, 1972.
- Description
- Book — 53 leaves. 30 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA248 .A75 1972 F | Available |
- Aaboe, Asger.
- [New York] : L. W. Singer, [1963, c1964]
- Description
- Book — 1 online resource (x, 133 p. : ill., diagrs)
- Summary
-
- Chapter 1. Babylonian Mathematics Chapter 2. Early Greek Mathematics and Euclid's Construction of the Regular Pentagon Chapter 3. Three Samples of Archimedean Mathematics Chapter 4. Ptolemy's Construction of a Trigonometric Table Appendix
- AADIOS (Meeting) (5th : 2012 : Sofia, Bulgaria)
- Berlin : Springer, 2014.
- Description
- Book — 1 online resource (xii, 201 pages) Digital: text file; PDF.
- Summary
-
- Constructions of Free Commutative Integro-Differential Algebras
- Basic Module Theory over Non-commutative Rings with Computational Aspects of Operator Algebras
- Operational Calculi for Nonlocal Cauchy Problems in Resonance Cases
- Intertwining Laplace Transformations of Linear Partial Differential Equations
- Composing and Factoring Generalized Green's Operators and Ordinary Boundary Problems
- Relativistic Coulomb Integrals and Zeilberger's Holonomic Systems Approach II
- Multivariate Dimension Polynomials of Inversive Difference Field Extensions
- Differential (Monoid) Algebra and More
- Exact Solution of Local and Nonlocal BVPs for the Laplace Equation in a Rectangle.
8. Algebraic algorithms and error-correcting codes : ... international conference, AAECC ... : proceedings [1985 - 1985]
- AAECC.
- Berlin ; New York : Springer-Verlag, c1986.
- Description
- Journal/Periodical — v. : ill. ; 25 cm.
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks
|
Request (opens in new tab) |
QA268 .A34 3RD 1985 | Available |
9. Applicable algebra, error-correcting codes, combinatorics and computer algebra : proceedings [1986 - 1986]
- AAECC.
- Berlin ; New York : Springer-Verlag, c1988.
- Description
- Journal/Periodical — v. : ill. ; 25 cm.
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks
|
Request (opens in new tab) |
QA268 .A34 4TH 1986 | Available |
- AAECC.
- Berlin ; New York : Springer-Verlag, 1989-
- Description
- Journal/Periodical — v. ; 24 cm.
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks
BEGINNING WITH 2001, SUBSERIES CLASSED AS SEPARATES |
Request (opens in new tab) |
QA268 .A34 5TH 1987 | Available |
QA268 .A34 6TH 1988 | Available |
QA268 .A34 8TH 1990 | Available |
QA268 .A34 9TH 1991 | Available |
QA268 .A34 10TH 1993 | Available |
QA268 .A34 11TH 1995 | Available |
QA268 .A34 12TH 1997 | Available |
QA268 .A34 13TH 1999 | Available |
11. Applied algebra, algorithmics and error-correcting codes : ... international conference, AAECC ... : proceedings [1980 - 1984]
- AAECC.
- Berlin ; New York : Springer-Verlag, -c1986.
- Description
- Journal/Periodical — v. : ill. ; 25 cm.
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks
|
Request (opens in new tab) |
QA268 .A34 2ND 1984 | Available |
- AAECC-10 (1993 : San Juan, P.R.)
- Berlin ; New York : Springer-Verlag, ©1993.
- Description
- Book — 1 online resource (x, 354 pages) : illustrations
- Summary
-
- Sequence based methods for data transmission and source compression / A.R. Calderbank, P.C. Fishburn, A. Rabinovich
- On the apparent duality of the Kerdock and Preparata codes / A.R. Hammons [and others]
- Bounds for codes as solutions of extremum problems for systems of orthogonal polynomials / V. Levenshtein
- Systems of algebraic equations solved by means of endomorphisms / H.M. Moller
- Criteria for sequence set design in CDMA communications / R.A. Scholtz
- Using Groebner bases to determine the algebraic and transcendental nature of field extensions: return of the killer tag variables / M. Sweedler
- A "divide and conquer" algorithm for Hilbert-Poincare series, multiplicity and dimension of monomial ideals / A.M. Bigatti [and others]
- An efficient algorithm for the sparse mixed resultant / J.F. Canny, I. Emiris
- Some features of binary block codes for correcting asymmetric errors / G. Fang [and others]
- Fixed-parameter complexity and cryptography / M.R. Fellows, N. Koblitz
- A class of algebraic geometric codes from curves in high-dimensional projective spaces / G.L. Feng, T.R.N. Rao
- A new class of sequences / G. Gong
- A zero-test and an interpolation algorithm for the shifted sparse polynomials / D. Grigoriev, M. Karpinski
- Parallelization of quantifier elimination on a workstation network / H Hong
- Hyperplane sections of fermat varieties in P³ in char. 2 and some applications to cyclic codes / H. Janwa, R.M. Wilson
- Analysis of Coppersmith's block Wiedemann algorithm for the parallel solution of sparse linear systems / E. Kaltofen
- Relations among lie formal series and construction of symplectic integrators / P.-V. Koseleff
- Exponential sums as discrete Fourier transform with invariant phase functions / G. Lachaud
- Application of finite fields to memory interleaving / A. Lempel, G. Seroussi
- An elementary proof of a partial improvement to the Ax-Katz theorem / O. Moreno, C.J. Moreno
- Energy functions associated with error-correcting codes / C. Renteria, H. Tapia-Recillas
- On determining all codes in semi-simple group rings / R.E. Sabin
- On hyperbolic cascaded Reed-Solomon codes / K. Saints, C. Heegard
- Peak-shift and bit error-correction with channel side information in runlength-limited sequences / Y. Saitoh, I. Ibe, H. Imai
- On a third order differential equation whose differential galois group is the simple group of 168 elements / M.F. Singer, F. Ulmer
- Approximating the number of error locations within a constant ratio is NP-complete / J. Stern
- Two chosen plaintext attacks on the Li-wang joint authentication and encryption scheme / J. van Tilburg
- Some constructions of perfect binary codes / A. Vardy, T. Etzion.
- AAECC-11 (1995 : Paris, France)
- Berlin ; New York : Springer-Verlag, 1995.
- Description
- Book — 1 online resource (xi, 484 pages) : illustrations
- Summary
-
- Supports of a code.- Chemical isomerism, a challenge for algebraic combinatorics and for computer science.- On algebraic methods in covering radius problems.- How lower and upper complexity bounds meet in elimination theory.- Bivariate polynomial multiplication patterns.- Division of entire functions by polynomial ideals.- Variations on minimal codewords in linear codes.- On the computation of the radical of polynomial complete inter
- section ideals.- Which families of long binary linear codes have a binomial weight distribution?.- The discovery of simple 7-designs with automorphism group P?L(2, 32).- Fast exponentation in cryptography.- On maximal spherical codes I.- Formal computation of Galois groups with relative resolvents.- A case of automatic theorem proving in Euclidean geometry: the Maclane 83 theorem.- Isometry classes of indecomposable linear codes.- When polynomial equation systems can be "solved" fast?.- Using symmetric functions to describe the solution set of a zero dimensional ideal.- Triangular systems and factorized Groebner bases.- Computation in algebraic function fields for effective construction of algebraic-geometric codes.- Singly-even self-dual codes and Hadamard matrices.- Implicitization of curves parameterized by generalized trigonometric polynomials.- Randomness properties of partial ? - ? planes as LSI test inputs and their implementations.- Mixed covering codes with two binary and four ternary coordinates.- About approximations of exponentials.- A note on normal bases.- On the covering radius of long Goppa codes.- Integration of multivariate rational functions given by straight-line programs.- Polynomial gcd computations over towers of algebraic extensions.- Displacements of matrix products.- Testing identities of series defined by algebraic partial differential equations.- The complexity of formal resolution of linear partial differential equations.- A fast parallel implementation of the Berlekamp-Massey algorithm with a 1D systolic array architecture.- Tomography of constructible functions.- On the determination of formal solutions of a system of partial differential equations.- D 4, E 6, E 8 and the AGM.- Computation of the Galois groups of the resolvent factors for the direct and inverse Galois problems.- First integrals and Darboux polynomials of homogeneous linear differential systems.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- AAECC-12 (1997 : Toulouse, France)
- Berlin ; New York : Springer, 1997.
- Description
- Book — 1 online resource (x, 352 pages) : illustrations
- Summary
-
- Minimun distance decoding algorithms for linear codes.- Efficient multivariate factorization over finite fields.- On maximal codes in polynomial metric spaces.- Yet another ideal decomposition algorithm.- A resultant theory for ordinary algebraic differential equations.- The symmetry group of ? q n in the Lee space and the ? q n-linear codes.- On repeated-root cyclic codes and the two-way chain condition.- Exponentiation in finite fields: Theory and practice.- Computing minimum-link path in a homotopy class amidst semi-algebraic obstacles in the plane.- Certain self-dual codes over ?4 and the odd Leech lattice.- Order functions and evaluation codes.- Codes from cocycles.- A brief tour of split linear programming.- Elementary approximation of exponentials of Lie polynomials.- On the q-ary image of cyclic codes.- The split weight (w L , w R ) enumeration of Reed-Muller codes for w L +w R d min.- Optimal linear codes of dimension 4 over GF(5).- Characterisations of lexicographic sets and simply-connected Hilbert schemes.- An iterative probabilistic decoding algorithm for binary linear block codes beyond the half minimum distance.- Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach.- Formal duality of linearly presentable codes over a Galois field.- Trace-function on a Galois ring in coding theory.- A vector version of the BMS algorithm for implementing fast erasure-and-error decoding of one-point AG codes.- On generalized Hamming weights of codes constructed on affine algebraic sets.- Some results on regular mappings.- Extension theorems for linear codes over finite rings.- Nonperiodic cyclic equivalence classes of cyclic codes and algebraic constructions of cyclically permutable codes.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- AAECC-13 (1999 : Honolulu, Hawaii)
- Berlin ; New York : Springer, ©1999.
- Description
- Book — 1 online resource (xiii, 510 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Invited Papers.- Codes on Graphs: A Survey for Algebraists.- RA Codes Achieve AWGN Channel Capacity.- Monomial Ideals and Planar Graphs.- A Fast Program Generator of Fast Fourier Transforms.- On Integer Programming Problems Related to Soft-Decision Iterative Decoding Algorithms.- Curves with Many Points and Their Applications.- Codes and Iterative Decoding.- New Sequences of Linear Time Erasure Codes Approaching the Channel Capacity.- On the Theory of Low-Density Convolutional Codes.- Combinatorics I: Arithmetic.- On the Distribution of Nonlinear Recursive Congruential Pseudorandom Numbers of Higher Orders.- A New Representation of Boolean Functions.- Combinatorics II: Graphs and Matrices.- An Algorithm to Compute a Nearest Point in the Lattice A n * .- Sequences from Cocycles.- Block Codes I.- On the Second Greedy Weight for Binary Linear Codes.- On the Size of Identifying Codes.- Algebra I: Rings and Fields.- Fast Quantum Fourier Transforms for a Class of Non-abelian Groups.- Linear Codes and Rings of Matrices.- On ?4-Simplex Codes and Their Gray Images.- Decoding Methods.- Some Results on Generalized Concatenation of Block Codes.- Near Optimal Decoding for TCM Using the BIVA and Trellis Shaping.- An Optimality Testing Algorithm for a Decoded Codeword of Binary Block Codes and Its Computational Complexity.- Algebra II.- Recursive MDS-Codes and Pseudogeometries.- Strength of ISTY1 without FL Function for Higher Order Differential Attack.- Code Construction.- Quantum Reed-Solomon Codes.- Capacity Bounds for the 3-Dimensional (0, 1) Runlength Limited Channel.- Rectangular Codes and Rectangular Algebra.- Codes and Algebra I: Algebraic Curves.- Decoding Hermitian Codes with Sudan's Algorithm.- Computing a Basis of
- on an affine algebraic curve with one rational place at infinit.- Cryptography.- Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications.- An Authentication Scheme over Non-authentic Public Channel in Information-Theoretic Secret-Key Agreement.- Codes and Decoding.- A Systolic Array Architecture for Fast Decoding of One-Point AG Codes and Scheduling of Parallel Processing on It.- Convolutional Codes.- Computing Weight Distributions of Convolutional Codes Via Shift Register Synthesis.- Properties of Finite Response Input Sequences of Recursive Convolutional Codes.- Combinatorics III: Designs.- Lower Bounds for Group Covering Designs.- Characteristic Functions of Relative Difference Sets, Correlated Sequences and Hadamard Matrices.- Decoding of Block Codes.- Double Circulant Self-Dual Codes Using Finite-Field Wavelet Transforms.- Algebra III: Rings and Fields.- Linear Codes and Polylinear Recurrences over Finite Rings and Modules (A Survey).- Calculating Generators for Invariant Fields of Linear Algebraic Groups.- Constructing Elements of Large Order in Finite Fields.- Modulation and Codes.- New Lower Bounds on the Periodic Crosscorrelation of QAM Codes with Arbitrary Energy.- Conjectures on the Size of Constellations Constructed from Direct Sums of PSK Kernels.- Codes and Algebra II: Groebner Bases and AG Codes.- A New Criterion for Normal Form Algorithms.- Discrete Fourier Transform and Groebner Bases.- Block Codes II.- On the State Complexities of Ternary Codes.- Binary Optimal Linear Rate 1/2 Codes.- On Binary/Ternary Error-Correcting Codes with Minimum Distance 4.- Algebra IV: Polynomials.- The Euclidean Algorithm and Primitive Polynomials over Finite Fields.- On the Computational Hardness of Testing Square-Freeness of Sparse Polynomials.- Mastrovito Multiplier for General Irreducible Polynomials.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- AAECC-14 (2001 : Melbourne, Vic.)
- Berlin : Springer, 2001.
- Description
- Book — xii, 398 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the refereed proceedings of the 14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-14, held in Melbourne, Australia in November 2001. The 36 revised full papers presented together with four invited papers were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on block codes, code constructions, codes and algebra - rings and fields, codes and algebra - algebraic geometry codes, sequences, cryptography, algorithms, algorithms - decoding, and algebraic constructions.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA268 .A34 14TH 2001 | Available |
- AAECC-15 (2003 : Toulouse, France)
- Berlin ; New York : Springer, c2003.
- Description
- Book — x, 264 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the refereed proceedings of the 15th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-15, held in Toulouse, France, in May 2003. The 25 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 40 submissions. Among the subjects addressed are block codes; algebra and codes: rings, fields, and AG codes; cryptography; sequences; decoding algorithms; and algebra: constructions in algebra, Galois groups, differential algebra, and polynomials.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA268 .A34 15TH 2003 | Available |
- AAECC-16 (2006 : Las Vegas, Nev.)
- Berlin ; New York : Springer, c2006.
- Description
- Book — xi, 337 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the refereed proceedings of the 16th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-16, held in Las Vegas, NV, USA in February 2006. The 25 revised full papers presented together with 7 invited papers were carefully reviewed and selected from 32 submissions. Among the subjects addressed are block codes; algebra and codes: rings, fields, and AG codes; cryptography; sequences; decoding algorithms; and algebra: constructions in algebra, Galois groups, differential algebra, and polynomials.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA268 .A34 16TH 2006 | Available |
- AAECC-16 (2006 : Las Vegas, Nev.)
- Berlin ; New York : Springer, c2006.
- Description
- Book — xi, 337 p. : ill.
- AAECC-17 (2007 : Bangalore, India)
- Berlin ; New York : Springer, ©2007.
- Description
- Book — 1 online resource (xii, 368 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Invited Contributions.- List Decoding and Pseudorandom Constructions.- A Survey of Recent Attacks on the Filter Generator.- Iterative List Decoding of LDPC Codes.- Inverted Edwards Coordinates.- Spectra of Boolean Functions, Subspaces of Matrices, and Going Up Versus Going Down.- Efficient List Decoding of Explicit Codes with Optimal Redundancy.- Algebraic Structure Theory of Tail-Biting Trellises.- Nice Codes from Nice Curves.- Regular Contributions.- Generalized Sudan's List Decoding for Order Domain Codes.- Bent Functions and Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA.- Determining the Nonlinearity of a New Family of APN Functions.- An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths.- Space-Time Codes from Crossed Product Algebras of Degree 4.- On Non-randomness of the Permutation After RC4 Key Scheduling.- Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes.- Fault-Tolerant Finite Field Computation in the Public Key Cryptosystems.- A Note on a Class of Quadratic Permutations over
- Constructions of Orthonormal Lattices and Quaternion Division Algebras for Totally Real Number Fields.- Quaternary Plotkin Constructions and Quaternary Reed-Muller Codes.- Joint Source-Cryptographic-Channel Coding Based on Linear Block Codes.- On the Key-Privacy Issue of McEliece Public-Key Encryption.- Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function.- Linear Complexity and Autocorrelation of Prime Cube Sequences.- The "Art of Trellis Decoding" Is NP-Hard.- On the Structure of Inversive Pseudorandom Number Generators.- Subcodes of Reed-Solomon Codes Suitable for Soft Decoding.- Normalized Minimum Determinant Calculation for Multi-block and Asymmetric Space-Time Codes.- On the Computation of Non-uniform Input for List Decoding on Bezerra-Garcia Tower.- Dense MIMO Matrix Lattices - A Meeting Point for Class Field Theory and Invariant Theory.- Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks.- Links Between Discriminating and Identifying Codes in the Binary Hamming Space.- Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity.- A Path to Hadamard Matrices.- The Tangent FFT.- Novel Algebraic Structure for Cyclic Codes.- Distribution of Trace Values and Two-Weight, Self-orthogonal Codes over GF(p, 2).- Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions ? 9 Variable Boolean Functions with Nonlinearity 242.- On Quasi-cyclic Codes over Integer Residue Rings.- Extended Norm-Trace Codes with Optimized Correction Capability.- On Generalized Hamming Weights and the Covering Radius of Linear Codes.- Homomorphic Encryptions of Sums of Groups.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)