clarify 发表于 2025-3-26 21:35:43

http://reply.papertrans.cn/39/3838/383710/383710_31.png

exostosis 发表于 2025-3-27 04:08:46

http://reply.papertrans.cn/39/3838/383710/383710_32.png

凶猛 发表于 2025-3-27 08:07:54

http://reply.papertrans.cn/39/3838/383710/383710_33.png

gerontocracy 发表于 2025-3-27 11:03:57

http://reply.papertrans.cn/39/3838/383710/383710_34.png

DEMN 发表于 2025-3-27 15:39:10

http://reply.papertrans.cn/39/3838/383710/383710_35.png

Infant 发表于 2025-3-27 21:31:36

http://reply.papertrans.cn/39/3838/383710/383710_36.png

Accede 发表于 2025-3-28 00:47:10

Praktische Beobachtungen und Erfahrungen,particularly where information symbols appear (or are constrained to be) in geometrical patterns (e.g., tapes, cards, discs, chips, etc.). The two main fields of application are in communications systems and for information storage systems.

TEM 发表于 2025-3-28 05:35:02

http://reply.papertrans.cn/39/3838/383710/383710_38.png

方舟 发表于 2025-3-28 09:44:45

http://reply.papertrans.cn/39/3838/383710/383710_39.png

可憎 发表于 2025-3-28 10:25:02

http://reply.papertrans.cn/39/3838/383710/383710_40.png
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Geometries, Codes and Cryptography; G. Longo,M. Marchi,A. Sgarro Book 1990 Springer-Verlag Wien 1990 algebra.authentication.coding.coding