[图书][B] Non-commutative cryptography and complexity of group-theoretic problems
Myasnikov (City College of New York) et al. apply the complexity of non-commutative groups
to public key cryptography, assess the generic-case performance of various algorithms, and …
to public key cryptography, assess the generic-case performance of various algorithms, and …
[图书][B] Group-based cryptography
This book is about relations between three di? erent areas of mathematics and
theoreticalcomputer science: combinatorialgroup theory, cryptography, and c-plexity theory …
theoreticalcomputer science: combinatorialgroup theory, cryptography, and c-plexity theory …
Semi-local string comparison: Algorithmic techniques and applications
A Tiskin - Mathematics in Computer Science, 2008 - Springer
Given two strings, the longest common subsequence (LCS) problem consists in computing
the length of the longest string that is a subsequence of both input strings. Its generalisation …
the length of the longest string that is a subsequence of both input strings. Its generalisation …
[HTML][HTML] Fast distance multiplication of unit-Monge matrices
A Tiskin - Algorithmica, 2015 - Springer
Monge matrices play a fundamental role in optimisation theory, graph and string algorithms.
Distance multiplication of two Monge matrices of size n can be performed in time O (n 2) …
Distance multiplication of two Monge matrices of size n can be performed in time O (n 2) …
Measuring sets in infinite groups
We are now witnessing a rapid growth of a new part of group theory which has become
known as" statistical group theory". A typical result in this area would say something like``a …
known as" statistical group theory". A typical result in this area would say something like``a …
[图书][B] Handbook of algebra
M Hazewinkel - 2000 - books.google.com
Algebra, as we know it today, consists of many different ideas, concepts and results. A rea-
sonable estimate of the number of these different “items” would be somewhere between …
sonable estimate of the number of these different “items” would be somewhere between …
On the plant leaf's boundary,jupe à godets' and conformal embeddings
S Nechaev, R Voituriez - Journal of Physics A: Mathematical and …, 2001 - iopscience.iop.org
The stable profile of the boundary of a plant's leaf fluctuating in the direction transverse to
the leaf's surface is described in the framework of a model called asurface à godets'(SG). It is …
the leaf's surface is described in the framework of a model called asurface à godets'(SG). It is …
Random walks on free products of cyclic groups
J Mairesse, F Mathéus - Journal of the London Mathematical …, 2007 - Wiley Online Library
Let G be a free product of a finite family of finite groups, with the set of generators being
formed by the union of the finite groups. We consider a transient nearest‐neighbour random …
formed by the union of the finite groups. We consider a transient nearest‐neighbour random …
Ballistic deposition patterns beneath a growing Kardar-Parisi-Zhang interface
We consider a (1+ 1)-dimensional ballistic deposition process with next-nearest-neighbor
interactions, which belongs to the Kardar-Parisi-Zhang (KPZ) universality class. The focus of …
interactions, which belongs to the Kardar-Parisi-Zhang (KPZ) universality class. The focus of …
The Myhill-Nerode theorem for recognizable tree series
B Borchardt - … Conference on Developments in Language Theory, 2003 - Springer
In this paper we prove a Myhill-Nerode theorem for recognizable tree series over
commutative semifields and thereby present a minimization of bottom-up finite state …
commutative semifields and thereby present a minimization of bottom-up finite state …