This is the most comprehensive compilation on combinatorial optiomization I have seen so far. Usually, Papadimitriou's book is a good place for this material - but in many cases, looking for proofs and theorems - I had to use several books: (*) Combinatorial Optimization Algorithms and Complexity by
Asymptotic Combinatorial Coding Theory
โ Scribed by Volodia Blinovsky (auth.)
- Publisher
- Springer US
- Year
- 1997
- Tongue
- English
- Leaves
- 115
- Series
- The Springer International Series in Engineering and Computer Science 415
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Asymptotic Combinatorial Coding Theory is devoted to the investigation of the combinatorial properties of transmission systems using discrete signals. The book presents results of interest to specialists in combinatorics seeking to apply combinatorial methods to problems of combinatorial coding theory.
Asymptotic Combinatorial Coding Theory serves as an excellent reference for resarchers in discrete mathematics, combinatorics, and combinatorial coding theory, and may be used as a text for advanced courses on the subject.
โฆ Table of Contents
Front Matter....Pages i-xxvii
Coding Bounds....Pages 1-6
List Decoding....Pages 7-40
Covering and Packing....Pages 41-61
Decoding Complexity....Pages 63-73
Channel with Defects....Pages 75-78
Some Other Problems....Pages 79-87
Back Matter....Pages 89-93
โฆ Subjects
Electrical Engineering; Combinatorics; Discrete Mathematics in Computer Science
๐ SIMILAR VOLUMES
<span>This comprehensive textbook on combinatorial optimization places specialemphasis on theoretical results and algorithms with provably goodperformance, in contrast to heuristics. It is based on numerous courses on combinatorial optimization and specialized topics, mostly at graduate level. This
<p><span>Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user h
<p><span>Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user h
<p><span>Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user h