找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: General Theory of Information Transfer and Combinatorics; Rudolf Ahlswede,Lars B?umer,Haik Mashurian Book 2006 Springer-Verlag Berlin Heid

[復(fù)制鏈接]
樓主: 漏出
11#
發(fā)表于 2025-3-23 21:55:01 | 只看該作者
Large Families of Pseudorandom Sequences of , Symbols and Their Complexity – Part IIer the .–complexity (extended now to .–ary alphabets) . of a family .. It serves again as a performance parameter of key spaces in cryptography. We give a lower bound for the .–complexity for a family of the type constructed in Part I. In the last sections we explain what can be said about the theor
12#
發(fā)表于 2025-3-24 02:05:29 | 只看該作者
13#
發(fā)表于 2025-3-24 03:42:05 | 只看該作者
14#
發(fā)表于 2025-3-24 09:31:45 | 只看該作者
Density Functional Calculations,s an answer to the question “What is the actual message?” In the identification problem we deal with the question how many possible messages the receiver of a noisy channel can identify? Identification means there is an answer to the question “Is the actual message .?” Here . can be any member of the set of possible messages.
15#
發(fā)表于 2025-3-24 12:29:00 | 只看該作者
https://doi.org/10.1007/978-3-031-37499-9ede. This and other directions of research can be found also in [2]. Well known is Shannon’s theory of transmission of messages over a noisy channel ([15]). Using the framework of Shannon’s channel model a new concept of information transfer – called identification – was introduced by Ahlswede and Dueck in [1].
16#
發(fā)表于 2025-3-24 17:50:50 | 只看該作者
Computational Commutative Algebra 2tian’s result on multiple descriptions [13], we refine our previous proof on successive refinability conditions reported in [7] and restate the result by Tuncel and Rose [17]. In particular, it is noted that the successive refinement in “purely” reliability sense is always possible.
17#
發(fā)表于 2025-3-24 22:43:49 | 只看該作者
,Theodorsen’s Integral Equation,,...,.. We are interested in codes . with the property that, given any descendant .., one can always identify at least one of the ‘parent’ codewords in .. We study bounds on .(.,.), the maximal cardinality of a code . with this property, which we call the .. Such codes play a role in schemes that protect against piracy of software.
18#
發(fā)表于 2025-3-25 02:18:06 | 只看該作者
19#
發(fā)表于 2025-3-25 04:09:40 | 只看該作者
20#
發(fā)表于 2025-3-25 08:34:29 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-11 07:55
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
江永县| 石楼县| 车致| 长乐市| 墨竹工卡县| 柘城县| 区。| 安图县| 泽普县| 乌鲁木齐市| 绥阳县| 神池县| 射阳县| 上饶县| 即墨市| 六安市| 新绛县| 合水县| 綦江县| 宁都县| 建平县| 东丽区| 岐山县| 阿鲁科尔沁旗| 沅陵县| 栾城县| 金门县| 二连浩特市| 天津市| 丰顺县| 巴林右旗| 阿图什市| 义马市| 天柱县| 莎车县| 乐亭县| 山西省| 大余县| 万年县| 哈尔滨市| 沅陵县|