|
|
|
|
LEADER |
03278nam a2200517 4500 |
001 |
978-3-319-77697-2 |
003 |
DE-He213 |
005 |
20191028151649.0 |
007 |
cr nn 008mamaa |
008 |
180405s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319776972
|9 978-3-319-77697-2
|
024 |
7 |
|
|a 10.1007/978-3-319-77697-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA297-299.4
|
072 |
|
7 |
|a UYA
|2 bicssc
|
072 |
|
7 |
|a COM051300
|2 bisacsh
|
072 |
|
7 |
|a UYA
|2 thema
|
082 |
0 |
4 |
|a 518
|2 23
|
100 |
1 |
|
|a Kneusel, Ronald T.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Random Numbers and Computers
|h [electronic resource] /
|c by Ronald T. Kneusel.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XVI, 260 p. 42 illus., 27 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a 1 Random and Pseudorandom Sequences -- 2 Generating Uniform Random Numbers -- 3 Generating Nonuniform Random Numbers -- 4 Testing Pseudorandom Generators -- 5 Parallel Random Number Generators -- 6 Cryptographically Secure Pseudorandom Number Generators -- 7 Other Random Sequences. .
|
520 |
|
|
|a This book covers pseudorandom number generation algorithms, evaluation techniques, and offers practical advice and code examples. Random Numbers and Computers is an essential introduction or refresher on pseudorandom numbers in computer science. The first comprehensive book on the topic, readers are provided with a practical introduction to the techniques of pseudorandom number generation, including how the algorithms work and how to test the output to decide if it is suitable for a particular purpose. Practical applications are demonstrated with hands-on presentation and descriptions that readers can apply directly to their own work. Examples are in C and Python and given with an emphasis on understanding the algorithms to the point of practical application. The examples are meant to be implemented, experimented with and improved/adapted by the reader. .
|
650 |
|
0 |
|a Numerical analysis.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Mathematical statistics.
|
650 |
1 |
4 |
|a Numeric Computing.
|0 http://scigraph.springernature.com/things/product-market-codes/I1701X
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|0 http://scigraph.springernature.com/things/product-market-codes/I16021
|
650 |
2 |
4 |
|a Algorithms.
|0 http://scigraph.springernature.com/things/product-market-codes/M14018
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Probability and Statistics in Computer Science.
|0 http://scigraph.springernature.com/things/product-market-codes/I17036
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319776965
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319776989
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030085162
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-77697-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|