You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Interested in how an efficient search engine works? Want to know what algorithms are used to rank resulting documents in response to user requests? The authors answer these and other key information retrieval design and implementation questions. This book is not yet another high level text. Instead, algorithms are thoroughly described, making this book ideally suited for both computer science students and practitioners who work on search-related applications. As stated in the foreword, this book provides a current, broad, and detailed overview of the field and is the only one that does so. Examples are used throughout to illustrate the algorithms. The authors explain how a query is ranked ag...
This book presents a selection of the papers presented at EUROCODE '90, the symposium on coding theory held in Udine, Italy, November 1990. It gives the state of the art on coding in Europe and ranges from theoretical top- ics like algebraic geometry and combinatorial coding to applications like modulation, real-space decoding and VLSI implementation. The book is divided into eight sections: - Algebraic codes - Combinatorial codes - Geometric codes - Protection of information - Convolutional codes - Information theory - Modulation - Applications of coding. Five of the sections are introduced by an invited contribution.
This book is made of the proceedings of EUROCODE 1992 which was held in Udine (Italy) at the CISM, October 27 - 30, 1992. EUROCODE ’92 is a continuation as well as an extension of the previous colloquia Trois Journèes sur le codage and EUROCODE ’90, whose proceedings appeared as Lecture Notes in Computer Science (Volumes 388 and 514). The aim of EUROCODE ’92 was to attract high level research papers and to encourage interchange of ideas among the areas of coding theory and related fields which share the same tools for applications in the science of communications, theoretical computer science, software engineering and mathematics. Then the book is characterized by a very broad spectrum, ranging from combinatories or algebraic geometry to implementation of coding algorithms. There were about 90 participants to the conference, from the academic and industrial worlds; 53 conferences were selected. The submitted full-papers were separately refereed for publication by at least two international referees.
A collection of papers written by prominent experts that examine a variety of advanced topics related to Boolean functions and expressions.
The object of this book is to provide an account of the results and methods used in combinatorial theories: Graph Theory, Matching Theory, Hamiltonian Problems, Hypergraph Theory, Designs, Steiner Systems, Latin Squares, Coding Matroids, Complexity Theory.In publishing this volume, the editors do not intend to discuss all the classical open problems in combinatorics for which an algebraic approach turns out to be useful. The work is a selection which is intended for specialists, as well as for graduate students who may also be interested in survey papers. The work features a special section which contains a list of unsolved problems proposed by the participants.
This book offers a systematic presentation of cryptographic and code-theoretic aspects of the theory of Boolean functions. Both classical and recent results are thoroughly presented. Prerequisites for the book include basic knowledge of linear algebra, group theory, theory of finite fields, combinatorics, and probability. The book can be used by research mathematicians and graduate students interested in discrete mathematics, coding theory, and cryptography.
Combinatorics 79. Part II
Eurocrypt is a series of open workshops on the theory and application of cryptographic techniques. These meetings have taken place in Europe every year since 1982 and are sponsored by the International Association for Cryptologic Research. Eurocrypt '93 was held in the village of Lofthus in Norway in May 1993. The call for papers resulted in 117 submissions with authors representing 27 different countries. The 36 accepted papers were selected by the program committee after a blind refereeing process. The papers are grouped into parts on authentication, public key, block ciphers, secret sharing, stream ciphers, digital signatures, protocols, hash functions, payment systems, and cryptanalysis. The volume includes 6 further rump session papers.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Conference on Finite Fields and Applications, Fq7, held in Toulouse, France, in May 2004. The 19 revised full papers presented were carefully selected from around 60 presentations at the conference during two rounds of reviewing and revision. Among the topics addressed are Weierstrass semigroups, Galois rings, hyperelliptic curves, polynomial irreducibility, pseudorandom number sequences, permutation polynomials, random polynomials, matrices, function fields, ramified towers, BCH codes, cyclic codes, primitive polynomials, covering sequences, cyclic decompositions.
From the reviews: "About 30 years ago, when I was a student, the first book on combinatorial optimization came out referred to as "the Lawler" simply. I think that now, with this volume Springer has landed a coup: "The Schrijver". The box is offered for less than 90.- EURO, which to my opinion is one of the best deals after the introduction of this currency." OR-Spectrum