Wonder Club world wonders pyramid logo
×

Sequences II: Methods in Communication, Security, and Computer Science Book

Sequences II: Methods in Communication, Security, and Computer Science
Be the First to Review this Item at Wonderclub
X
Sequences II: Methods in Communication, Security, and Computer Science, This volume provides an up-to-date view of several topics in theoretical computer science and suggests directions for future research. It constitutes a valuable working tool for mathematicians, electrical engineers and computer scientists and will be of i, Sequences II: Methods in Communication, Security, and Computer Science
out of 5 stars based on 0 reviews
5
0 %
4
0 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Sequences II: Methods in Communication, Security, and Computer Science
  • Written by author Renato Capocelli
  • Published by Springer-Verlag New York, LLC, 7/31/2012
  • This volume provides an up-to-date view of several topics in theoretical computer science and suggests directions for future research. It constitutes a valuable working tool for mathematicians, electrical engineers and computer scientists and will be of i
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Preface
Contributors
Communication
On the Enumeration of Dyadic Distributions 3
Detection of Skew in a Sequence of Subsets 12
Asymmetric Error Correcting Codes 24
Binary Perfect Weighted Coverings (PWC) 36
Read/Write Isolated Memory 52
Polynomial-Time Construction of Linear Codes with Almost Equal Weights 59
Welch's Bound and Sequence Sets for Code-Division Multiple-Access Systems 63
Average-Case Interactive Communication 79
Adaptive Lossless Data Compression Over a Noisy Channel 104
Computer Science
Parallel String Matching Algorithms 121
Some Applications of Rabin's Fingerprinting Method 143
Periodic Prefixes in Texts 153
Reconstructing Sequences from Shotgun Data 166
A Systematic Design and Explanation of the Atrubin Multiplier 189
On the Shannon Capacity of Graph Formulae 203
An Efficient Algorithm for the All Pairs Suffix-Prefix Problem 218
Efficient Algorithms for Sequence Analysis 225
Coding Trees as Strings for Approximate Tree Matching 245
Deciding Code Related Properties by Means of Finite Transducers 260
On the Derivation of Spline Bases 273
Optimal Parallel Pattern Matching Through Randomization 292
Approximate String-Matching and the q-gram Distance 300
Universal Discrimination of Individual Sequences via Finite-State Classifiers 313
Security
Improving the Efficiency and Reliability of Digital Time-Stamping 329
A Note on Secret Sharing Schemes 335
Privacy of Dense Symmetric Functions 345
Efficient Reduction among Oblivious Transfer Protocols Based on New Self-Intersecting Codes 360
Perfect Zero-Knowledge Sharing Schemes over any Finite Abelian Group 369
Some Comments on the Computation of n-th Roots in Z[subscript n] 379
The Varieties of Secure Distributed Computation 392
Fair Games Against an All-Powerful Adversary 418
An Asymptotic Coding Theorem for Authentification and Secrecy 430
Automata and Combinatorics on Words
Gray Codes and Strongly Square-Free Strings 439
A New Unavoidable Regularity in Free Monoids 447
The Star Height One Problem for Irreducible Automata 457
Synchronizing Automata 470
Author Index 477


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Sequences II: Methods in Communication, Security, and Computer Science, This volume provides an up-to-date view of several topics in theoretical computer science and suggests directions for future research. It constitutes a valuable working tool for mathematicians, electrical engineers and computer scientists and will be of i, Sequences II: Methods in Communication, Security, and Computer Science

X
WonderClub Home

This item is in your Collection

Sequences II: Methods in Communication, Security, and Computer Science, This volume provides an up-to-date view of several topics in theoretical computer science and suggests directions for future research. It constitutes a valuable working tool for mathematicians, electrical engineers and computer scientists and will be of i, Sequences II: Methods in Communication, Security, and Computer Science

Sequences II: Methods in Communication, Security, and Computer Science

X
WonderClub Home

This Item is in Your Inventory

Sequences II: Methods in Communication, Security, and Computer Science, This volume provides an up-to-date view of several topics in theoretical computer science and suggests directions for future research. It constitutes a valuable working tool for mathematicians, electrical engineers and computer scientists and will be of i, Sequences II: Methods in Communication, Security, and Computer Science

Sequences II: Methods in Communication, Security, and Computer Science

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: