|
|
|
|
| LEADER |
03008nam a22006015i 4500 |
| 001 |
978-3-642-30615-0 |
| 003 |
DE-He213 |
| 005 |
20151204175400.0 |
| 007 |
cr nn 008mamaa |
| 008 |
120626s2012 gw | s |||| 0|eng d |
| 020 |
|
|
|a 9783642306150
|9 978-3-642-30615-0
|
| 024 |
7 |
|
|a 10.1007/978-3-642-30615-0
|2 doi
|
| 040 |
|
|
|d GrThAP
|
| 050 |
|
4 |
|a QA76.9.M35
|
| 072 |
|
7 |
|a PBD
|2 bicssc
|
| 072 |
|
7 |
|a UYAM
|2 bicssc
|
| 072 |
|
7 |
|a COM018000
|2 bisacsh
|
| 072 |
|
7 |
|a MAT008000
|2 bisacsh
|
| 082 |
0 |
4 |
|a 004.0151
|2 23
|
| 245 |
1 |
0 |
|a Sequences and Their Applications – SETA 2012
|h [electronic resource] :
|b 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings /
|c edited by Tor Helleseth, Jonathan Jedwab.
|
| 264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2012.
|
| 300 |
|
|
|a XII, 339 p. 25 illus.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 347 |
|
|
|a text file
|b PDF
|2 rda
|
| 490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 7280
|
| 505 |
0 |
|
|a Perfect sequences -- finite fields -- boolean functions -- Golomb 80th birthday session -- linear complexity -- frequency hopping -- correlation of sequences -- bounds on sequences cryptography -- aperiodic correlation -- Walsh transform.
|
| 520 |
|
|
|a This book constitutes the refereed proceedings of the 7th International Conference on Sequences and Their Applications, SETA 2012, held in Waterloo, Canada, in June 2012. The 28 full papers presented together with 2 invited papers in this volume were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on perfect sequences; finite fields; boolean functions; Golomb 80th birthday session; linear complexity; frequency hopping; correlation of sequences; bounds on sequences, cryptography; aperiodic correlation; and Walsh transform.
|
| 650 |
|
0 |
|a Computer science.
|
| 650 |
|
0 |
|a Computer communication systems.
|
| 650 |
|
0 |
|a Data encryption (Computer science).
|
| 650 |
|
0 |
|a Coding theory.
|
| 650 |
|
0 |
|a Algorithms.
|
| 650 |
|
0 |
|a Computer science
|x Mathematics.
|
| 650 |
|
0 |
|a Management information systems.
|
| 650 |
1 |
4 |
|a Computer Science.
|
| 650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
| 650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
| 650 |
2 |
4 |
|a Data Encryption.
|
| 650 |
2 |
4 |
|a Computer Communication Networks.
|
| 650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
| 650 |
2 |
4 |
|a Coding and Information Theory.
|
| 700 |
1 |
|
|a Helleseth, Tor.
|e editor.
|
| 700 |
1 |
|
|a Jedwab, Jonathan.
|e editor.
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer eBooks
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783642306143
|
| 830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 7280
|
| 856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-30615-0
|z Full Text via HEAL-Link
|
| 912 |
|
|
|a ZDB-2-SCS
|
| 912 |
|
|
|a ZDB-2-LNC
|
| 950 |
|
|
|a Computer Science (Springer-11645)
|