Search Results for ""
151 - 160 of 505 for Golay CodeSearch Results
Cryptology is the science of making and breaking secure codes. It consists of cryptography, the science of making secure codes, and cryptanalysis, the science of breaking ...
The 3-node tournament (and directed graph) illustrated above (Harary 1994, p. 205).
The cylindrical parts of a system of real algebraic equations and inequalities in variables {x_1,...,x_n} are the terms f_1 <= x_1<=g_1 (1) f_2(x_1) <= x_2<=g_2(x_1) (2) | ...
Let A be any algebra over a field F, and define a derivation of A as a linear operator D on A satisfying (xy)D=(xD)y+x(yD) for all x,y in A. Then the set D(A) of all ...
The curve d(u) in the ruled surface parameterization x(u,v)=b(u)+vd(u).
A generalization by Kronecker of Kummer's theory of prime ideal factors. A divisor on a full subcategory C of mod(A) is an additive mapping chi on C with values in a ...
A term in social choice theory meaning each alternative receives equal weight for a single vote.
The second-order ordinary differential equation y^('')+[(alphaeta)/(1+eta)+(betaeta)/((1+eta)^2)+gamma]y=0, where eta=e^(deltax).
The set of all edge automorphisms of G, denoted Aut^*(G). Let L(G) be the line graph of a graph G. Then the edge automorphism group Aut^*(G) is isomorphic to Aut(L(G)), ...
The partial differential equation u_(xy)+(alphau_x-betau_y)/(x-y)=0.
...
View search results from all Wolfram sites (28409 matches)

