Download Sequences and Their Applications - SETA 2014: 8th by Kai-Uwe Schmidt, Arne Winterhof PDF

By Kai-Uwe Schmidt, Arne Winterhof

ISBN-10: 3319123246

ISBN-13: 9783319123240

ISBN-10: 3319123254

ISBN-13: 9783319123257

This publication constitutes the refereed lawsuits of the eighth overseas convention on Sequences and Their purposes, SETA 2014, held in Melbourne, VIC, Australia, in November 2014. The 24 complete papers offered including 2 invited papers have been conscientiously reviewed and chosen from 36 submissions. The papers were equipped in topical sections on Boolean capabilities, excellent sequences, correlation of arrays, relative distinction units, aperiodic correlation, pseudorandom sequences and circulate ciphers, crosscorrelation of sequences, top numbers in sequences, OFDM and CDMA, and frequency-hopping sequences.

Show description

Read or Download Sequences and Their Applications - SETA 2014: 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings PDF

Best internet & networking books

A+, Network+, Security+ Exams in a Nutshell

A+, Network+, and defense+ certifications are famous during the because the common for proving foundation-level IT ability units. A+, community+ and safety+ checks in a Nutshell offers precisely what skilled execs have to cross one or all of those CompTIA certification tests. it is an all-in-one evaluation source that boils down very important recommendations and strategies and provides the data in an accessable structure.

Engineering Environment-Mediated Multi-Agent Systems: International Workshop, EEMMAS 2007, Dresden, Germany, October 5, 2007, Selected Revised and

This booklet constitutes the completely refereed court cases of the overseas Workshop on Engineering Environment-Mediated Multi-Agent platforms, EEMMAS 2007, held in Dresden, Germany, in October 2007, along side ECCS 2007, the ecu convention on advanced platforms the amount contains sixteen completely revised papers, chosen from the lectures given on the workshop, including 2 papers because of invited talks by way of sought after researchers within the box.

Conversational Informatics: A Data-Intensive Approach with Emphasis on Nonverbal Communication

This ebook covers an method of conversational informatics which encompasses technological know-how and know-how for knowing and augmenting dialog within the community age. an important problem in engineering is to strengthen a know-how for conveying not only messages but in addition underlying knowledge. proper theories and practices in cognitive linguistics and communique technology, in addition to recommendations built in computational linguistics and synthetic intelligence, are mentioned.

Extra info for Sequences and Their Applications - SETA 2014: 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings

Example text

1673, 25–32 (2014) 35. : A new method to construct Boolean functions with good cryptographic properties. Inform. Process. Lett. 113(14), 567–571 (2013) 36. : More balanced Boolean functions with optimal algebraic immunity, and good nonlinearity and resistance to fast algebraic attacks. IEEE Trans. Inf. edu/∼klapper/ Abstract. We introduce a new transform on Boolean functions generalizing the Walsh-Hadamard transform. For Boolean functions q and f , the q-transform of f measures the proximity of f to the set of functions obtained from q by change of basis.

At−1 + am−t−1 ), and r−1 h(a) = i=0 ρim (a0 ar a2r ) + m−t−1 ρim (a0 at ). i=0 If t = m/2, then π = 0 and the function is neither semi-bent nor bent. For t = m/2, according to the expression obtained for π(a), we can assume without loss of generality that 0 < t < m/2. Let s = gcd(2t, m). It follows from Theorem 1 of [20, p. 190] that π is a 2s -to-1 mapping since gcd(xt + xm−t , xm +1) = xs +1. This is equivalent to saying that Sw is either an empty set or an s-dimensional affine subspace of GF (2)m .

At−1 + am−t−1 ), and r−1 h(a) = i=0 ρim (a0 ar a2r ) + m−t−1 ρim (a0 at ). i=0 If t = m/2, then π = 0 and the function is neither semi-bent nor bent. For t = m/2, according to the expression obtained for π(a), we can assume without loss of generality that 0 < t < m/2. Let s = gcd(2t, m). It follows from Theorem 1 of [20, p. 190] that π is a 2s -to-1 mapping since gcd(xt + xm−t , xm +1) = xs +1. This is equivalent to saying that Sw is either an empty set or an s-dimensional affine subspace of GF (2)m .

Download PDF sample

Rated 4.00 of 5 – based on 41 votes