找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: General Theory of Information Transfer and Combinatorics; Rudolf Ahlswede,Lars B?umer,Haik Mashurian Book 2006 Springer-Verlag Berlin Heid

[復(fù)制鏈接]
樓主: 漏出
11#
發(fā)表于 2025-3-23 21:55:01 | 只看該作者
Large Families of Pseudorandom Sequences of , Symbols and Their Complexity – Part IIer the .–complexity (extended now to .–ary alphabets) . of a family .. It serves again as a performance parameter of key spaces in cryptography. We give a lower bound for the .–complexity for a family of the type constructed in Part I. In the last sections we explain what can be said about the theor
12#
發(fā)表于 2025-3-24 02:05:29 | 只看該作者
13#
發(fā)表于 2025-3-24 03:42:05 | 只看該作者
14#
發(fā)表于 2025-3-24 09:31:45 | 只看該作者
Density Functional Calculations,s an answer to the question “What is the actual message?” In the identification problem we deal with the question how many possible messages the receiver of a noisy channel can identify? Identification means there is an answer to the question “Is the actual message .?” Here . can be any member of the set of possible messages.
15#
發(fā)表于 2025-3-24 12:29:00 | 只看該作者
https://doi.org/10.1007/978-3-031-37499-9ede. This and other directions of research can be found also in [2]. Well known is Shannon’s theory of transmission of messages over a noisy channel ([15]). Using the framework of Shannon’s channel model a new concept of information transfer – called identification – was introduced by Ahlswede and Dueck in [1].
16#
發(fā)表于 2025-3-24 17:50:50 | 只看該作者
Computational Commutative Algebra 2tian’s result on multiple descriptions [13], we refine our previous proof on successive refinability conditions reported in [7] and restate the result by Tuncel and Rose [17]. In particular, it is noted that the successive refinement in “purely” reliability sense is always possible.
17#
發(fā)表于 2025-3-24 22:43:49 | 只看該作者
,Theodorsen’s Integral Equation,,...,.. We are interested in codes . with the property that, given any descendant .., one can always identify at least one of the ‘parent’ codewords in .. We study bounds on .(.,.), the maximal cardinality of a code . with this property, which we call the .. Such codes play a role in schemes that protect against piracy of software.
18#
發(fā)表于 2025-3-25 02:18:06 | 只看該作者
19#
發(fā)表于 2025-3-25 04:09:40 | 只看該作者
20#
發(fā)表于 2025-3-25 08:34:29 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-11 02:11
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
洪洞县| 弥渡县| 平阴县| 茂名市| 正定县| 会理县| 鹤庆县| 靖宇县| 阳江市| 申扎县| 彩票| 五河县| 象州县| 吉木乃县| 乐安县| 长垣县| 杭州市| 昌乐县| 河南省| 贞丰县| 广宁县| 霍州市| 沾益县| 新安县| 大名县| 洪雅县| 内黄县| 克拉玛依市| 景宁| 项城市| 特克斯县| 青海省| 南江县| 元朗区| 德州市| 固原市| 五家渠市| 温泉县| 杨浦区| 古丈县| 永登县|