首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20篇
  免费   0篇
  国内免费   1篇
数学   21篇
  2014年   2篇
  2011年   1篇
  2004年   1篇
  2003年   2篇
  1998年   3篇
  1996年   1篇
  1981年   2篇
  1979年   1篇
  1978年   3篇
  1977年   2篇
  1975年   1篇
  1974年   1篇
  1972年   1篇
排序方式: 共有21条查询结果,搜索用时 505 毫秒
1.
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes.  相似文献   
2.
New constructions of regular disjoint distinct difference sets (DDDS) are presented. In particular, multiplicative and additive DDDS are considered.  相似文献   
3.
Let(n) be the least integer such thatn may be represented in the formn=x 1 2 +x 2 3 +...+x (n) (n)+1 wherex 1,x 2, ...,x (n) are natural numbers. We computed(n) forn 250 000 and found that(n) 5 for all thesen exceptn=56, 160 for which(n)=6. Also(n) 4 for 41542<n<=250 000.  相似文献   
4.
5.
We consider the simultaneous equations $$\begin{gathered} p_1^{\alpha _1 } p_2^{\alpha _2 } ...p_n^{\alpha _n } = P_1 P_2 \hfill \\ p_{n + 1} = P_1 - P_2 \hfill \\ \end{gathered} $$ wherep 1,p 2,...,p n+1 are then+1 first primes and α1,...,α n ,P 1,P 2 are integers. The equations are solved completely forn≦3 and all solutions given under certain restrictions on the α i 's forn≦9.  相似文献   
6.
The concepts of a linear covering code and a covering set for the limited-magnitude-error channel are introduced. A number of covering-set constructions, as well as some bounds, are given. In particular, optimal constructions are given for some cases involving small-magnitude errors. A problem of Stein is partially solved for these cases. Optimal packing sets and the corresponding error-correcting codes are also considered for some small-magnitude errors.  相似文献   
7.
CHENWENDE(陈文德)(InstituteofSystemsSciences,theChineseAcademyofSciences,Beijing100080,ChinaandStateKeyLabraryofInformationSecur...  相似文献   
8.
9.
Weight Hierarchies of Linear Codes Satisfying the Chain Condition   总被引:1,自引:0,他引:1  
The weight hierarchy of a linear [n,k;q] code C over GF(q) is the sequence (d1,d2,...,dk) where dr is the smallest support of an r–dimensional subcode of C. By explicit construction, it is shown that if a sequence (a1,a2,...,ak) satisfies certain conditions, then it is the weight hierarchy of a code satisfying the chain condition.  相似文献   
10.
We study the weight distribution of the linear codes over GF(ql) which have generator matrices over GF(q) and their dual codes. As an application we find the weight distribution of the irreducible cyclic (23(21≈1), 111) codes over GF(2) for all lnot divisible by 11.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号