Coding, Cryptography and Combinatorics:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Basel
Birkhäuser Basel
2004
|
Schriftenreihe: | Progress in Computer Science and Applied Logic
23 |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | It has long been recognized that there are fascinating connections between cod ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the program committee. Thus, it was de cided to call on all invited speakers and presenters of accepted contributed talks to submit their manuscripts for publication in the present volume. Altogether, 39 submissions were received and subjected to another round of refereeing. After care ful scrutiny, 28 papers were accepted for publication |
Beschreibung: | 1 Online-Ressource (VIII, 405 p) |
ISBN: | 9783034878654 9783034896023 |
DOI: | 10.1007/978-3-0348-7865-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042421972 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150317s2004 |||| o||u| ||||||eng d | ||
020 | |a 9783034878654 |c Online |9 978-3-0348-7865-4 | ||
020 | |a 9783034896023 |c Print |9 978-3-0348-9602-3 | ||
024 | 7 | |a 10.1007/978-3-0348-7865-4 |2 doi | |
035 | |a (OCoLC)1165460996 | ||
035 | |a (DE-599)BVBBV042421972 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-703 |a DE-91 |a DE-634 | ||
082 | 0 | |a 003.54 |2 23 | |
084 | |a MAT 000 |2 stub | ||
100 | 1 | |a Feng, Keqin |e Verfasser |4 aut | |
245 | 1 | 0 | |a Coding, Cryptography and Combinatorics |c edited by Keqin Feng, Harald Niederreiter, Chaoping Xing |
264 | 1 | |a Basel |b Birkhäuser Basel |c 2004 | |
300 | |a 1 Online-Ressource (VIII, 405 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Progress in Computer Science and Applied Logic |v 23 | |
500 | |a It has long been recognized that there are fascinating connections between cod ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the program committee. Thus, it was de cided to call on all invited speakers and presenters of accepted contributed talks to submit their manuscripts for publication in the present volume. Altogether, 39 submissions were received and subjected to another round of refereeing. After care ful scrutiny, 28 papers were accepted for publication | ||
650 | 4 | |a Computer science | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Combinatorics | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Data Structures, Cryptology and Information Theory | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Codierungstheorie |0 (DE-588)4139405-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kombinatorik |0 (DE-588)4031824-2 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
655 | 7 | |8 2\p |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Codierungstheorie |0 (DE-588)4139405-7 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 2 | |a Kombinatorik |0 (DE-588)4031824-2 |D s |
689 | 0 | |8 3\p |5 DE-604 | |
700 | 1 | |a Niederreiter, Harald |e Sonstige |4 oth | |
700 | 1 | |a Xing, Chaoping |e Sonstige |4 oth | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-0348-7865-4 |x Verlag |3 Volltext |
912 | |a ZDB-2-SMA |a ZDB-2-BAE | ||
940 | 1 | |q ZDB-2-SMA_Archive | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027857389 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804153095702183936 |
---|---|
any_adam_object | |
author | Feng, Keqin |
author_facet | Feng, Keqin |
author_role | aut |
author_sort | Feng, Keqin |
author_variant | k f kf |
building | Verbundindex |
bvnumber | BV042421972 |
classification_tum | MAT 000 |
collection | ZDB-2-SMA ZDB-2-BAE |
ctrlnum | (OCoLC)1165460996 (DE-599)BVBBV042421972 |
dewey-full | 003.54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 003 - Systems |
dewey-raw | 003.54 |
dewey-search | 003.54 |
dewey-sort | 13.54 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
doi_str_mv | 10.1007/978-3-0348-7865-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03750nmm a2200625zcb4500</leader><controlfield tag="001">BV042421972</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150317s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783034878654</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-0348-7865-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783034896023</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-0348-9602-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-0348-7865-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1165460996</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042421972</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">003.54</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Feng, Keqin</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Coding, Cryptography and Combinatorics</subfield><subfield code="c">edited by Keqin Feng, Harald Niederreiter, Chaoping Xing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Basel</subfield><subfield code="b">Birkhäuser Basel</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VIII, 405 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Progress in Computer Science and Applied Logic</subfield><subfield code="v">23</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">It has long been recognized that there are fascinating connections between cod ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the program committee. Thus, it was de cided to call on all invited speakers and presenters of accepted contributed talks to submit their manuscripts for publication in the present volume. Altogether, 39 submissions were received and subjected to another round of refereeing. After care ful scrutiny, 28 papers were accepted for publication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Combinatorics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures, Cryptology and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kombinatorik</subfield><subfield code="0">(DE-588)4031824-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">2\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kombinatorik</subfield><subfield code="0">(DE-588)4031824-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Niederreiter, Harald</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xing, Chaoping</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-0348-7865-4</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SMA</subfield><subfield code="a">ZDB-2-BAE</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SMA_Archive</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027857389</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content 2\p (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Aufsatzsammlung Konferenzschrift |
id | DE-604.BV042421972 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:21:10Z |
institution | BVB |
isbn | 9783034878654 9783034896023 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027857389 |
oclc_num | 1165460996 |
open_access_boolean | |
owner | DE-384 DE-703 DE-91 DE-BY-TUM DE-634 |
owner_facet | DE-384 DE-703 DE-91 DE-BY-TUM DE-634 |
physical | 1 Online-Ressource (VIII, 405 p) |
psigel | ZDB-2-SMA ZDB-2-BAE ZDB-2-SMA_Archive |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Birkhäuser Basel |
record_format | marc |
series2 | Progress in Computer Science and Applied Logic |
spelling | Feng, Keqin Verfasser aut Coding, Cryptography and Combinatorics edited by Keqin Feng, Harald Niederreiter, Chaoping Xing Basel Birkhäuser Basel 2004 1 Online-Ressource (VIII, 405 p) txt rdacontent c rdamedia cr rdacarrier Progress in Computer Science and Applied Logic 23 It has long been recognized that there are fascinating connections between cod ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the program committee. Thus, it was de cided to call on all invited speakers and presenters of accepted contributed talks to submit their manuscripts for publication in the present volume. Altogether, 39 submissions were received and subjected to another round of refereeing. After care ful scrutiny, 28 papers were accepted for publication Computer science Data structures (Computer science) Coding theory Combinatorics Computer Science Coding and Information Theory Data Structures, Cryptology and Information Theory Informatik Kryptologie (DE-588)4033329-2 gnd rswk-swf Codierungstheorie (DE-588)4139405-7 gnd rswk-swf Kombinatorik (DE-588)4031824-2 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content 2\p (DE-588)1071861417 Konferenzschrift gnd-content Codierungstheorie (DE-588)4139405-7 s Kryptologie (DE-588)4033329-2 s Kombinatorik (DE-588)4031824-2 s 3\p DE-604 Niederreiter, Harald Sonstige oth Xing, Chaoping Sonstige oth https://doi.org/10.1007/978-3-0348-7865-4 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Feng, Keqin Coding, Cryptography and Combinatorics Computer science Data structures (Computer science) Coding theory Combinatorics Computer Science Coding and Information Theory Data Structures, Cryptology and Information Theory Informatik Kryptologie (DE-588)4033329-2 gnd Codierungstheorie (DE-588)4139405-7 gnd Kombinatorik (DE-588)4031824-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4139405-7 (DE-588)4031824-2 (DE-588)4143413-4 (DE-588)1071861417 |
title | Coding, Cryptography and Combinatorics |
title_auth | Coding, Cryptography and Combinatorics |
title_exact_search | Coding, Cryptography and Combinatorics |
title_full | Coding, Cryptography and Combinatorics edited by Keqin Feng, Harald Niederreiter, Chaoping Xing |
title_fullStr | Coding, Cryptography and Combinatorics edited by Keqin Feng, Harald Niederreiter, Chaoping Xing |
title_full_unstemmed | Coding, Cryptography and Combinatorics edited by Keqin Feng, Harald Niederreiter, Chaoping Xing |
title_short | Coding, Cryptography and Combinatorics |
title_sort | coding cryptography and combinatorics |
topic | Computer science Data structures (Computer science) Coding theory Combinatorics Computer Science Coding and Information Theory Data Structures, Cryptology and Information Theory Informatik Kryptologie (DE-588)4033329-2 gnd Codierungstheorie (DE-588)4139405-7 gnd Kombinatorik (DE-588)4031824-2 gnd |
topic_facet | Computer science Data structures (Computer science) Coding theory Combinatorics Computer Science Coding and Information Theory Data Structures, Cryptology and Information Theory Informatik Kryptologie Codierungstheorie Kombinatorik Aufsatzsammlung Konferenzschrift |
url | https://doi.org/10.1007/978-3-0348-7865-4 |
work_keys_str_mv | AT fengkeqin codingcryptographyandcombinatorics AT niederreiterharald codingcryptographyandcombinatorics AT xingchaoping codingcryptographyandcombinatorics |