Listing 1 - 10 of 15 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Computer Science --- Engineering & Applied Sciences --- Congresses --- Access control --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Congrès --- Accès --- Contrôle --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Operating Systems. --- Cryptography --- Computer software. --- Information Systems. --- Cryptology. --- Computer operating systems --- Disk operating systems --- Systems software --- Software, Computer --- Computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Operating systems --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Communication systems --- Distributed processing --- Foundations
Choose an application
Computer security --- Computers --- Data encryption (Computer science) --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Congresses --- Access control --- Congresses. --- Congrès --- Accès --- Contrôle --- Public key cryptography --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Congrès --- Accès --- Contrôle --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Computer programming. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Programming Techniques. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Cryptography --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems --- Computer operating systems --- Disk operating systems --- Systems software --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Operating systems --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Communication systems --- Distributed processing --- Foundations --- Programming
Choose an application
Choose an application
Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Congresses --- Congrès --- Sécurité informatique --- Congrès
Choose an application
This book constitutes the refereed proceedings of the 19th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-13, held in Honolulu, Hawaii, USA in November 1999. The 42 revised full papers presented together with six invited survey papers were carefully reviewed and selected from a total of 86 submissions. The papers are organized in sections on codes and iterative decoding, arithmetic, graphs and matrices, block codes, rings and fields, decoding methods, code construction, algebraic curves, cryptography, codes and decoding, convolutional codes, designs, decoding of block codes, modulation and codes, Gröbner bases and AG codes, and polynomials.
Error-correcting codes (Information theory) --- Algebra --- Algorithms --- Mathematics --- Physical Sciences & Mathematics --- Data processing --- Codes, Error-correcting (Information theory) --- Error-detecting codes (Information theory) --- Forbidden-combination check (Information theory) --- Self-checking codes (Information theory) --- Computer science. --- Data encryption (Computer science). --- Coding theory. --- Computers. --- Algorithms. --- Computer science --- Algebra. --- Computer Science. --- Theory of Computation. --- Coding and Information Theory. --- Symbolic and Algebraic Manipulation. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Mathematics. --- Artificial intelligence --- Automatic control --- Coding theory --- Information theory --- Information theory. --- Computer software. --- Cryptology. --- Data processing. --- Software, Computer --- Computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data compression (Telecommunication) --- Digital electronics --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Mathematical analysis --- Communication theory --- Communication --- Cybernetics --- Computer science—Mathematics. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Calculators --- Cyberspace --- Algorism --- Arithmetic --- Foundations
Choose an application
This is the proceedings of the SIGAL International Symposium on Algorithms held at CSK Information Education Center, Tokyo, Japan, August 16-18, 1990. SIGAL (Special Interest Group on Algorithms) was organized within the Information Processing Society of Japan in 1988 to encourage research in the field of discrete algorithms, and held 6-8 research meetings each year. This symposium is the first international symposium organized by SIGAL. In response to the call for papers, 88 papers were submitted from around the world. The program committee selected 34 for presentation at the symposium. The symposium also included 5 invited lectures and 10 invited presentations. The subjects of the papers range widely in the field of discrete algorithms in theoretical computer science. Keywords for these subjects are: computational geometry, graph algorithms, complexity theory, parallel algorithms, distributed computing, and computational algebra.
681.3*G3 --- 681.3*H3 --- Algorithms --- -681.3*F1 --- 681.3*F2 --- 681.3*G2 --- Algorism --- Algebra --- Arithmetic --- Probability and statistics: probabilistic algorithms (including Monte Carlo);random number generation; statistical computing; statistical software (Mathematics of computing) --- Information storage and retrieval. Cd-rom --- Congresses --- Computation by abstract devices --- Analysis of algorithms and problem complexity--See also {681.3*B6}; {681.3*B7}; {681.3*F13} --- Discrete mathematics (Mathematics of computing) --- Foundations --- Congresses. --- 681.3*G2 Discrete mathematics (Mathematics of computing) --- 681.3*F2 Analysis of algorithms and problem complexity--See also {681.3*B6}; {681.3*B7}; {681.3*F13} --- 681.3*F1 Computation by abstract devices --- 681.3*H3 Information storage and retrieval. Cd-rom --- 681.3*G3 Probability and statistics: probabilistic algorithms (including Monte Carlo);random number generation; statistical computing; statistical software (Mathematics of computing) --- 681.3*F1 --- Information theory. --- Computer engineering. --- Operations research. --- Computer software. --- Computer science. --- Combinatorics. --- Theory of Computation. --- Electrical Engineering. --- Operations Research/Decision Theory. --- Algorithm Analysis and Problem Complexity. --- Computation by Abstract Devices. --- Combinatorics --- Mathematical analysis --- Informatics --- Science --- Software, Computer --- Computer systems --- Operational analysis --- Operational research --- Industrial engineering --- Management science --- Research --- System theory --- Computers --- Communication theory --- Communication --- Cybernetics --- Design and construction
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
Error-correcting codes (Information theory) --- Algebra --- Algorithms --- Codes correcteurs d'erreurs (Théorie de l'information) --- Algèbre --- Algorithmes --- Congresses. --- Data processing --- Congrès --- Informatique --- Mathematics --- Physical Sciences & Mathematics --- Codes, Error-correcting (Information theory) --- Error-detecting codes (Information theory) --- Forbidden-combination check (Information theory) --- Self-checking codes (Information theory) --- Computer science. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Coding and Information Theory. --- Data Encryption. --- Discrete Mathematics in Computer Science. --- Algorithm Analysis and Problem Complexity. --- Symbolic and Algebraic Manipulation. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Foundations --- Artificial intelligence --- Automatic control --- Coding theory --- Computational complexity. --- Computer software. --- Cryptology. --- Data processing. --- Software, Computer --- Computer systems --- Complexity, Computational --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics --- Algebraic algorithms --- Cryptography. --- Discrete mathematics. --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Listing 1 - 10 of 15 | << page >> |
Sort by
|