Listing 1 - 5 of 5 |
Sort by
|
Choose an application
This volume develops the depth and breadth of the mathematics underlying the construction and analysis of Hadamard matrices and their use in the construction of combinatorial designs. At the same time, it pursues current research in their numerous applications in security and cryptography, quantum information, and communications. Bridges among diverse mathematical threads and extensive applications make this an invaluable source for understanding both the current state of the art and future directions. The existence of Hadamard matrices remains one of the most challenging open questions in combinatorics. Substantial progress on their existence has resulted from advances in algebraic design theory using deep connections with linear algebra, abstract algebra, finite geometry, number theory, and combinatorics. Hadamard matrices arise in a very diverse set of applications. Starting with applications in experimental design theory and the theory of error-correcting codes, they have found unexpected and important applications in cryptography, quantum information theory, communications, and networking.
Algebra --- Mathematics --- Physical Sciences & Mathematics --- Combinatorial designs and configurations --- Hadamard matrices --- Configurations and designs, Combinatorial --- Designs and configurations, Combinatorial --- Mathematics. --- Matrix theory. --- Algebra. --- Information theory. --- Number theory. --- Combinatorics. --- Linear and Multilinear Algebras, Matrix Theory. --- Number Theory. --- Information and Communication, Circuits. --- Combinatorial analysis --- Matrices --- Math --- Science --- Number study --- Numbers, Theory of --- Combinatorics --- Mathematical analysis --- Communication theory --- Communication --- Cybernetics --- Combinatorial analysis.
Choose an application
The scope of the volume includes all algorithmic and computational aspects of research on combinatorial designs. Algorithmic aspects include generation, isomorphism and analysis techniques - both heuristic methods used in practice, and the computational complexity of these operations. The scope within design theory includes all aspects of block designs, Latin squares and their variants, pairwise balanced designs and projective planes and related geometries.
Discrete mathematics --- Combinatorial designs and configurations --- Computer algorithms. --- Data processing. --- Computer algorithms --- Data processing --- Algorithms --- Configurations and designs, Combinatorial --- Designs and configurations, Combinatorial --- Combinatorial analysis --- Combinatorial designs and configurations - Data processing
Choose an application
Choose an application
This book constitutes the refereed post-conference proceedings of the 30th International Workshop on Combinatorial Algorithms, IWOCA 2019, held in Pisa, Italy, in July 2019. The 36 regular papers presented in this volume were carefully reviewed and selected from 73 submissions. They cover diverse areas of combinatorical algorithms, complexity theory, graph theory and combinatorics, combinatorial optimization, cryptography and information security, algorithms on strings and graphs, graph drawing and labelling, computational algebra and geometry, computational biology, probabilistic and randomized algorithms, algorithms for big data analytics, and new paradigms of computation.
Computational complexity. --- Computer software. --- Data structures (Computer scienc. --- Computer science. --- Computer graphics. --- Discrete Mathematics in Computer Science. --- Algorithm Analysis and Problem Complexity. --- Data Structures. --- Arithmetic and Logic Structures. --- Computer Graphics. --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Informatics --- Science --- Software, Computer --- Computer systems --- Complexity, Computational --- Machine theory --- Digital techniques --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Combinatorial analysis --- Computer science—Mathematics. --- Algorithms. --- Data structures (Computer science). --- Arithmetic and logic units, Computer. --- Arithmetic and logic units, Computer --- Computer arithmetic --- Electronic digital computers --- Algorism --- Algebra --- Arithmetic --- Circuits --- Foundations --- Discrete mathematics. --- Artificial intelligence—Data processing. --- Computer arithmetic and logic units. --- Data Science. --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis
Choose an application
This volume records and disseminates selected papers from the Stinson66 conference, including surveys, prospectives, and papers presenting original and current research. It contains four accessible surveys of topics in combinatorial designs and related topics, ranging from a tutorial survey of connections to classical group theory, to surveys of "hot topics" in current research. It also contains a prospective paper identifying topics for future research efforts, co-authored by one of the elder statesmen of the field, Alex Rosa. Finally, the research papers examine topics ranging from pure mathematics to applied work in computing, networking, communications, and cryptography. For students and newcomers to these topics, the volume provides accessible survey material that does not have onerous prerequisites. The breadth of topics reflects the vibrancy of the field in a way that can be appreciated by all researchers. The papers present important advances on theory and applications, which also benefit advanced researchers.
Number theory. --- Quantum communication. --- Statistics. --- Computer science. --- Approximation theory. --- Number Theory. --- Quantum Communications and Cryptography. --- Computer Science. --- Approximations and Expansions. --- Cryptography
Listing 1 - 5 of 5 |
Sort by
|