000 | 05332nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-540-77404-4 | ||
003 | DE-He213 | ||
005 | 20240730193705.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2007 gw | s |||| 0|eng d | ||
020 |
_a9783540774044 _9978-3-540-77404-4 |
||
024 | 7 |
_a10.1007/978-3-540-77404-4 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUYA _2bicssc |
|
072 | 7 |
_aCOM014000 _2bisacsh |
|
072 | 7 |
_aUYA _2thema |
|
082 | 0 | 4 |
_a004.0151 _223 |
245 | 1 | 0 |
_aSequences, Subsequences, and Consequences _h[electronic resource] : _bInternational Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers / _cedited by Solomon W. Golomb, Guang Gong, Tor Helleseth, Hong-Yeop Song. |
250 | _a1st ed. 2007. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2007. |
|
300 |
_aX, 219 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v4893 |
|
505 | 0 | _aPeriodic Binary Sequences: Solved and Unsolved Problems -- On Boolean Functions Which Are Bent and Negabent -- Strongly Primitive Elements -- The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations -- On the Dual of Monomial Quadratic p-ary Bent Functions -- A New Family of Gold-Like Sequences -- Sequencings and Directed Graphs with Applications to Cryptography -- Double Periodic Arrays with Optimal Correlation for Applications in Watermarking -- Sequences for Phase-Encoded Optical CDMA -- Packing Centrosymmetric Patterns of n Nonattacking Queens on an n×n Board -- Cyclotomic Mapping Permutation Polynomials over Finite Fields -- Single-Track Gray Codes and Sequences -- The Asymptotic Behavior of ?-Adic Complexity with ?2?=???2 -- Shannon Capacity Limits of Wireless Networks -- Some Mysterious Sequences Associated with LDPC Codes -- Remarks on a Sequence of Minimal Niven Numbers -- The Linear Vector Space Spanned by the Nonlinear Filter Generator -- Existence of Modular Sonar Sequences of Twin-Prime Product Length -- Randomness and Representation of Span n Sequences -- On Attacks on Filtering Generators Using Linear Subspace Structures. | |
520 | _aThese are the proceedings of the Workshop on Sequences, Subsequences, and Consequences that was held at the University of Southern California (USC), May 31 - June 2, 2007. There were three one-hour Keynote lectures, 16 invited talks of up to 45 minutes each, and 1 "contributed" paper. The theory of sequences from discrete symbol alphabets has found practical applications in many areas of coded communications and in cryptography, - cluding: signal patterns for use in radar and sonar; spectral spreading sequences for CDMA wireless telephony; key streams for direct sequence stream-cipher cryptography; and a variety of forward-error-correctingcodes. The workshopwasdesigned to bring leading researcherson "sequences"from aroundtheworldtopresenttheirlatestresults,interchangeinformationwithone another, and especially to inform the larger audience of interested participants, includingfaculty,researchers,scholars,andstudentsfromnumerousinstitutions, as well as the readers of these proceedings, about recent developments in this important ?eld. There were invited speakers from Canada, China, Germany, India, Israel, Norway, Puerto Rico, and South Korea, in addition to those from the USA. Support for the workshop was generously provided by the O?ce of the Dean of the Viterbi School of Engineering, by the Center for Communications Research (CCR-La Jolla), and by the United States National Science Foundation (NSF). This support is hereby gratefully acknowledged. | ||
650 | 0 |
_aComputer science. _99832 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aDiscrete mathematics. _912873 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aTheory of Computation. _9154200 |
650 | 2 | 4 |
_aCoding and Information Theory. _9154201 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aDiscrete Mathematics in Computer Science. _931837 |
650 | 2 | 4 |
_aComputer Communication Networks. _9154202 |
700 | 1 |
_aGolomb, Solomon W. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9154203 |
|
700 | 1 |
_aGong, Guang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9154204 |
|
700 | 1 |
_aHelleseth, Tor. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9154205 |
|
700 | 1 |
_aSong, Hong-Yeop. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9154206 |
|
710 | 2 |
_aSpringerLink (Online service) _9154207 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540774037 |
776 | 0 | 8 |
_iPrinted edition: _z9783540846802 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v4893 _9154208 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-540-77404-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c94823 _d94823 |