Book Description
A self-contained account suited for a wide audience describing coding theory, combinatorial designs and their relations.
Author : E. F. Assmus
Publisher : Cambridge University Press
Page : 366 pages
File Size : 50,55 MB
Release : 1994-01-06
Category : Mathematics
ISBN : 9780521458399
A self-contained account suited for a wide audience describing coding theory, combinatorial designs and their relations.
Author : Cunsheng Ding
Publisher :
Page : 540 pages
File Size : 43,43 MB
Release : 2021
Category : Coding theory
ISBN : 9789811251337
"Since the publication of the first edition of this monograph, a generalisation of the Assmus-Mattson theorem for linear codes over finite fields has been developed, two 70-year breakthroughs and a considerable amount of other progress on t-designs from linear codes have been made. This second edition is a substantial revision and expansion of the first edition. Two new chapters and two new appendices have been added, and most chapters of the first edition have been revised. It provides a well-rounded and detailed account of t-designs from linear codes. Most chapters of this book cover the support designs of linear codes. A few chapters deal with designs obtained from linear codes in other ways. Connections among ovals, hyperovals, maximal arcs, ovoids, special functions, linear codes and designs are also investigated. This book consists of both classical and recent results on designs from linear codes. It is intended to be a reference for postgraduates and researchers who work on combinatorics, or coding theory, or digital communications, or finite geometry. It can also be used as a textbook for postgraduates in these subject areas"--
Author : Petteri Kaski
Publisher : Springer Science & Business Media
Page : 415 pages
File Size : 37,27 MB
Release : 2006-02-03
Category : Mathematics
ISBN : 3540289917
A new starting-point and a new method are requisite, to insure a complete [classi?cation of the Steiner triple systems of order 15]. This method was furnished, and its tedious and di?cult execution und- taken, by Mr. Cole. F. N. Cole, L. D. Cummings, and H. S. White (1917) [129] The history of classifying combinatorial objects is as old as the history of the objects themselves. In the mid-19th century, Kirkman, Steiner, and others became the fathers of modern combinatorics, and their work – on various objects, including (what became later known as) Steiner triple systems – led to several classi?cation results. Almost a century earlier, in 1782, Euler [180] published some results on classifying small Latin squares, but for the ?rst few steps in this direction one should actually go at least as far back as ancient Greece and the proof that there are exactly ?ve Platonic solids. One of the most remarkable achievements in the early, pre-computer era is the classi?cation of the Steiner triple systems of order 15, quoted above. An onerous task that, today, no sensible person would attempt by hand calcu- tion. Because, with the exception of occasional parameters for which com- natorial arguments are e?ective (often to prove nonexistence or uniqueness), classi?cation in general is about algorithms and computation.
Author : Patrick Arnold
Publisher : IOS Press
Page : 340 pages
File Size : 10,74 MB
Release : 2013
Category : Science
ISBN : 1614991626
The ground is one of the most highly variable of engineering materials. It is therefore not surprising that geotechnical designs depend on local site conditions and local engineering experience. Engineering practices, relating to investigation and design methods site understanding and to safety levels acceptable to society, will therefore vary between different regions.The challenge in geotechnical engineering is to make use of worldwide geotechnical experience, established over many years, to aid in the development and harmonization of geotechnical design codes. Given the significant uncertainties involved, empiricism and engineering
Author : P. J. Cameron
Publisher : Cambridge University Press
Page : 252 pages
File Size : 50,78 MB
Release : 1991-09-19
Category : Mathematics
ISBN : 9780521423854
This book stresses the connection between, and the applications of, design theory to graphs and codes. Beginning with a brief introduction to design theory and the necessary background, the book also provides relevant topics for discussion from the theory of graphs and codes.
Author : Martin Fowler
Publisher : Addison-Wesley Professional
Page : 461 pages
File Size : 44,74 MB
Release : 1999
Category : Computers
ISBN : 0201485672
Refactoring is gaining momentum amongst the object oriented programming community. It can transform the internal dynamics of applications and has the capacity to transform bad code into good code. This book offers an introduction to refactoring.
Author : Pierre Berloquin
Publisher : Sterling Publishing Company, Inc.
Page : 392 pages
File Size : 44,83 MB
Release : 2008
Category : Games & Activities
ISBN : 9781402728334
Berloquins spellbinding look at codemaking through the ages will grab historyand cryptology buffs alike, as he looks at secret codes from ancient times tothe present.
Author : Dingyi Pei
Publisher : CRC Press
Page : 253 pages
File Size : 38,33 MB
Release : 2006-01-13
Category : Computers
ISBN : 1420003186
Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to information systems. Authentication Codes and Combinatorial Designs presents new findings and original work on perfect authentication codes characterized in terms of combinatorial designs, namely strong partially
Author : John K. Ousterhout
Publisher :
Page : 0 pages
File Size : 17,94 MB
Release : 2021
Category : Computer programs
ISBN : 9781732102217
"This book addresses the topic of software design: how to decompose complex software systems into modules (such as classes and methods) that can be implemented relatively independently. The book first introduces the fundamental problem in software design, which is managing complexity. It then discusses philosophical issues about how to approach the software design process and it presents a collection of design principles to apply during software design. The book also introduces a set of red flags that identify design problems. You can apply the ideas in this book to minimize the complexity of large software systems, so that you can write software more quickly and cheaply."--Amazon.
Author : Michael Huber
Publisher : Now Publishers Inc
Page : 107 pages
File Size : 40,58 MB
Release : 2010
Category : Computers
ISBN : 1601983581
Combinatorial Designs for Authentication and Secrecy Codes is a succinct in-depth review and tutorial of a subject that promises to lead to major advances in computer and communication security. This monograph provides a tutorial on combinatorial designs, which gives an overview of the theory. Furthermore, the application of combinatorial designs to authentication and secrecy codes is described in depth. This close relationship of designs with cryptography and information security was first revealed in Shannon's seminal paper on secrecy systems. We bring together in one source foundational and current contributions concerning design-theoretic constructions and characterizations of authentication and secrecy codes.