Mathematical Methods in Computer Science Essays in Memory of Thomas Beth /

This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, which was held during December 17-19, 2008, in Karlsruhe, Germany, in memory of Thomas Beth. The themes of the conference reflected the many interests of Thomas Beth. Although, th...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Calmet, Jacques. (Editor, http://id.loc.gov/vocabulary/relators/edt), Geiselmann, Willi. (Editor, http://id.loc.gov/vocabulary/relators/edt), Müller-Quade, Jörn. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edition:1st ed. 2008.
Series:Theoretical Computer Science and General Issues ; 5393
Subjects:
Online Access:https://doi.org/10.1007/978-3-540-89994-5
LEADER 04871nam a22006495i 4500
001 978-3-540-89994-5
003 DE-He213
005 20210624223816.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 |a 9783540899945  |9 978-3-540-89994-5 
024 7 |a 10.1007/978-3-540-89994-5  |2 doi 
050 4 |a QA75.5-76.95 
050 4 |a QA76.63 
072 7 |a UY  |2 bicssc 
072 7 |a COM014000  |2 bisacsh 
072 7 |a UY  |2 thema 
072 7 |a UYA  |2 thema 
082 0 4 |a 004.0151  |2 23 
245 1 0 |a Mathematical Methods in Computer Science  |h [electronic resource] :  |b Essays in Memory of Thomas Beth /  |c edited by Jacques Calmet, Willi Geiselmann, Jörn Müller-Quade. 
250 |a 1st ed. 2008. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2008. 
300 |a XII, 191 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Theoretical Computer Science and General Issues ;  |v 5393 
505 0 |a Cryptography I -- On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries -- Designs -- Steiner t-Designs for Large t -- New Spatial Configurations -- Construction of Large Constant Dimension Codes with a Prescribed Minimum Distance -- Quantum Computing -- Invited Talk: Embedding Classical into Quantum Computation -- A Criterion for Attaining the Welch Bounds with Applications for Mutually Unbiased Bases -- An Efficient Quantum Algorithm for the Hidden Subgroup Problem over Weyl-Heisenberg Groups -- Algorithms -- Computing Equiangular Lines in Complex Space -- Complexity of Comparing Monomials and Two Improvements of the Buchberger-Möller Algorithm -- Coding Theory -- Invited Talk: Decoding Cyclic Codes: The Cooper Philosophy -- Kernel Dimension for Some Families of Quaternary Reed-Muller Codes -- Cryptography II -- Coding-Based Oblivious Transfer -- Protection of Sensitive Security Parameters in Integrated Circuits -- On Reconstruction of RC4 Keys from Internal States. 
520 |a This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, which was held during December 17-19, 2008, in Karlsruhe, Germany, in memory of Thomas Beth. The themes of the conference reflected the many interests of Thomas Beth. Although, these interests might seem diverse, mathematical methods and especially algebra as a language constituted the common denominator of all of his scientific achievements. The 12 contributed talks presented were carefully selected from 30 submissions and cover the topics cryptography, designs, quantum computing, algorithms, and coding theory. Furthermore, this volume contains two invited talks held at the conference. One focuses on the area of coding theory and symbolic computation, an area especially appreciated by Thomas Beth, because it combines algebra and algorithmics. The other one discusses quantum information, which again was a focus of Thomas Beth’s research. 
650 0 |a Computers. 
650 0 |a Computer science—Mathematics. 
650 0 |a Coding theory. 
650 0 |a Information theory. 
650 0 |a Artificial intelligence. 
650 0 |a Data structures (Computer science). 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Theory of Computation.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I16005 
650 2 4 |a Mathematics of Computing.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I17001 
650 2 4 |a Coding and Information Theory.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I15041 
650 2 4 |a Artificial Intelligence.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I21000 
650 2 4 |a Data Structures and Information Theory.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I15009 
650 2 4 |a Cryptology.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020 
700 1 |a Calmet, Jacques.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Geiselmann, Willi.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Müller-Quade, Jörn.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783540899952 
776 0 8 |i Printed edition:  |z 9783540899938 
830 0 |a Theoretical Computer Science and General Issues ;  |v 5393 
856 4 0 |u https://doi.org/10.1007/978-3-540-89994-5 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)