Combinatorial designs: constructions and analysis

DR Stinson - ACM SIGACT News, 2008 - dl.acm.org
The origins of combinatorial design theory lie within recreational mathematics. With the work
of Fisher and Yates in the 1930s it began to take on the character of a serious academic …

A tutorial on Reed–Solomon coding for fault‐tolerance in RAID‐like systems

JS Plank - Software: Practice and Experience, 1997 - Wiley Online Library
It is well‐known that Reed‐Solomon codes may be used to provide error correction for
multiple failures in RAID‐like systems. The coding technique itself, however, is not as well …

[图书][B] High-dimensional probability: An introduction with applications in data science

R Vershynin - 2018 - books.google.com
High-dimensional probability offers insight into the behavior of random vectors, random
matrices, random subspaces, and objects used to quantify uncertainty in high dimensions …

[图书][B] Spectra of graphs

AE Brouwer, WH Haemers - 2011 - books.google.com
This book gives an elementary treatment of the basic material about graph spectra, both for
ordinary, and Laplace and Seidel spectra. The text progresses systematically, by covering …

Springer series in statistics

P Bickel, P Diggle, S Fienberg, U Gather, I Olkin… - Principles and Theory …, 2009 - Springer
The idea for this book came from the time the authors spent at the Statistics and Applied
Mathematical Sciences Institute (SAMSI) in Research Triangle Park in North Carolina …

[图书][B] Mathematics of public key cryptography

SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …

Wireless power transfer for future networks: Signal processing, machine learning, computing, and sensing

B Clerckx, K Huang, LR Varshney… - IEEE Journal of …, 2021 - ieeexplore.ieee.org
Wireless power transfer (WPT) is an emerging paradigm that will enable using wireless to its
full potential in future networks, not only to convey information but also to deliver energy …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, L Reyzin, A Smith - … : International Conference On The Theory And …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric
information into keys usable for any cryptographic application, and reliably and securely …

Tight finite-key analysis for quantum cryptography

M Tomamichel, CCW Lim, N Gisin, R Renner - Nature communications, 2012 - nature.com
Despite enormous theoretical and experimental progress in quantum cryptography, the
security of most current implementations of quantum key distribution is still not rigorously …

Quantum error correction via codes over GF (4)

AR Calderbank, EM Rains, PM Shor… - IEEE Transactions on …, 1998 - ieeexplore.ieee.org
The problem of finding quantum error correcting codes is transformed into the problem of
finding additive codes over the field GF (4) which are self-orthogonal with respect to a …