Sequences II: Methods in Communication, Security, and Computer Science

Author:   Renato Capocelli ,  Alfredo DeSantis ,  Ugo Vaccaro
Publisher:   Springer-Verlag New York Inc.
Edition:   1993 ed.
ISBN:  

9780387979403


Pages:   477
Publication Date:   18 December 1992
Format:   Hardback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $258.72 Quantity:  
Add to Cart

Share |

Sequences II: Methods in Communication, Security, and Computer Science


Overview

This volume provides an up-to-date view of several topics in theoretical computer science and suggests directions for future research. It constitutes a valuable working tool for mathematicians, electrical engineers and computer scientists and will be of interest to researchers and graduate students in combinatorics, cryptography, information compression and transmission, or mathematics applied to engineering. Among the contributions to this volume, all by world-renowned scientists, are: Ramsey theory applied to showing the existence of arithmetic subsequences with applications to molecular biology; methods for finding the smallest possible Markov Chain that could produce a given sequence of numbers; construction of pseudo-random arrays; the relationship between stochastic complexity and data compression; string matching algorithms; parallel algorithms for string matching in various contexts; string and picture compression; dynamic data compression; coding sequences with constraints; universal sequences for graphs; coding theory; combinatorial issues, including techniques for designing error-correcting codes; and applications of information theory to external set theory. In addition, there are various contributions in related subjects such as distributed computing, approximation algorithms, and cryptography.

Full Product Details

Author:   Renato Capocelli ,  Alfredo DeSantis ,  Ugo Vaccaro
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   1993 ed.
Weight:   0.890kg
ISBN:  

9780387979403


ISBN 10:   0387979409
Pages:   477
Publication Date:   18 December 1992
Audience:   College/higher education ,  General/trade ,  Postgraduate, Research & Scholarly ,  General
Format:   Hardback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

Communication.- On the Enumeration of Dyadic Distributions.- Detection of Skew in a Sequence of Subsets.- Asymmetric Error Correcting Codes.- Binary Perfect Weighted Coverings (PWC).- Read/Write Isolated Memory.- Polynomial-Time Construction of Linear Codes with Almost Equal Weights.- Welch’s Bound and Sequence Sets for Code-Division Multiple-Access Systems.- Average-Case Interactive Communication.- Adaptive Lossless Data Compression Over a Noisy Channel.- Computer Science.- Parallel String Matching Algorithms.- Some Applications of Rabin’s Fingerprinting Method.- Periodic Prefixes in Texts.- Reconstructing Sequences from Shotgun Data.- A Systematic Design and Explanation of the Atrubin Multiplier.- On the Shannon Capacity of Graph Formulae.- An Efficient Algorithm for the All Pairs Suffix-Prefix Problem.- Efficient Algorithms for Sequence Analysis.- Coding Trees as Strings for Approximate Tree Matching.- Deciding Code Related Properties by Means of Finite Transducers.- On the Derivation of Spline Bases.- Optimal Parallel Pattern Matching Through Randomization.- Approximate String-Matching and the q-gram Distance.- Universal Discrimination of Individual Sequences via Finite-State Classifiers.- Security.- Improving the Efficiency and Reliability of Digital Time-Stamping.- A Note on Secret Sharing Schemes.- Privacy of Dense Symmetric Functions.- Efficient Reduction among Oblivious Transfer Protocols Based on New Self-Intersecting Codes.- Perfect Zero-Knowledge Sharing Schemes over any Finite Abelian Group.- Some Comments on the Computation of n-th Roots in Zn.- The Varieties of Secure Distributed Computation.- Fair Games Against an All-Powerful Adversary.- An Asymptotic Coding Theorem for Authentification and Secrecy.- Automata and Combinatorics on Words.- Gray Codesand Strongly Square-Free Strings.- A New Unavoidable Regularity in Free Monoids.- The Star Height One Problem for Irreducible Automata.- Synchronizing Automata.- Author Index.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

ARG20253

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List