dragon 发表于 2025-3-23 21:55:01

Large Families of Pseudorandom Sequences of , Symbols and Their Complexity – Part IIer the .–complexity (extended now to .–ary alphabets) . of a family .. It serves again as a performance parameter of key spaces in cryptography. We give a lower bound for the .–complexity for a family of the type constructed in Part I. In the last sections we explain what can be said about the theor

prodrome 发表于 2025-3-24 02:05:29

http://reply.papertrans.cn/39/3822/382133/382133_14.png

HAUNT 发表于 2025-3-24 03:42:05

http://reply.papertrans.cn/39/3822/382133/382133_15.png

难听的声音 发表于 2025-3-24 09:31:45

Density Functional Calculations,s an answer to the question “What is the actual message?” In the identification problem we deal with the question how many possible messages the receiver of a noisy channel can identify? Identification means there is an answer to the question “Is the actual message .?” Here . can be any member of the set of possible messages.

现代 发表于 2025-3-24 12:29:00

https://doi.org/10.1007/978-3-031-37499-9ede. This and other directions of research can be found also in . Well known is Shannon’s theory of transmission of messages over a noisy channel (). Using the framework of Shannon’s channel model a new concept of information transfer – called identification – was introduced by Ahlswede and Dueck in .

少量 发表于 2025-3-24 17:50:50

Computational Commutative Algebra 2tian’s result on multiple descriptions , we refine our previous proof on successive refinability conditions reported in and restate the result by Tuncel and Rose . In particular, it is noted that the successive refinement in “purely” reliability sense is always possible.

打火石 发表于 2025-3-24 22:43:49

,Theodorsen’s Integral Equation,,...,.. We are interested in codes . with the property that, given any descendant .., one can always identify at least one of the ‘parent’ codewords in .. We study bounds on .(.,.), the maximal cardinality of a code . with this property, which we call the .. Such codes play a role in schemes that protect against piracy of software.

针叶 发表于 2025-3-25 02:18:06

http://reply.papertrans.cn/39/3822/382133/382133_20.png

衍生 发表于 2025-3-25 04:09:40

http://reply.papertrans.cn/39/3822/382133/382133_21.png

初学者 发表于 2025-3-25 08:34:29

http://reply.papertrans.cn/39/3822/382133/382133_22.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: General Theory of Information Transfer and Combinatorics; Rudolf Ahlswede,Lars Bäumer,Haik Mashurian Book 2006 Springer-Verlag Berlin Heid