咨询与建议

限定检索结果

文献类型

  • 291 篇 期刊文献
  • 221 篇 会议
  • 111 册 图书
  • 21 篇 学位论文

馆藏范围

  • 640 篇 电子文献
  • 19 种 纸本馆藏

日期分布

学科分类号

  • 365 篇 理学
    • 340 篇 数学
    • 39 篇 物理学
    • 29 篇 统计学(可授理学、...
    • 7 篇 化学
    • 7 篇 生物学
    • 6 篇 系统科学
    • 2 篇 天文学
  • 250 篇 工学
    • 203 篇 计算机科学与技术...
    • 73 篇 软件工程
    • 28 篇 电气工程
    • 23 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 材料科学与工程(可...
    • 6 篇 化学工程与技术
    • 5 篇 机械工程
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 力学(可授工学、理...
    • 3 篇 土木工程
    • 2 篇 生物工程
  • 16 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
  • 6 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 5 篇 教育学
    • 4 篇 教育学
    • 4 篇 心理学(可授教育学...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
  • 2 篇 哲学
    • 2 篇 哲学
  • 2 篇 法学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 112 篇 polynomials
  • 89 篇 algebra
  • 35 篇 number theory
  • 34 篇 matrix algebra
  • 30 篇 computer science
  • 22 篇 graph theory
  • 18 篇 linear algebra
  • 15 篇 complexity theor...
  • 14 篇 mathematics
  • 13 篇 algorithms
  • 12 篇 computer algebra
  • 10 篇 group theory
  • 10 篇 cryptography
  • 9 篇 combinatorics
  • 8 篇 computational ma...
  • 8 篇 application soft...
  • 8 篇 applications of ...
  • 8 篇 boolean algebra
  • 8 篇 educational inst...
  • 8 篇 group theory and...

机构

  • 5 篇 school of mathem...
  • 4 篇 pennsylvania sta...
  • 3 篇 department of co...
  • 3 篇 computer science...
  • 3 篇 massachusetts in...
  • 3 篇 univ bath dept c...
  • 3 篇 georgia inst tec...
  • 3 篇 mit dept math ca...
  • 2 篇 department of co...
  • 2 篇 univ minho cmat ...
  • 2 篇 research laborat...
  • 2 篇 univ bonn b it d...
  • 2 篇 military academy...
  • 2 篇 institute of com...
  • 2 篇 department of co...
  • 2 篇 tilburg univ dep...
  • 2 篇 department of ap...
  • 2 篇 univ chicago dep...
  • 2 篇 university of mi...
  • 2 篇 school of electr...

作者

  • 5 篇 ziegler konstant...
  • 4 篇 basu saugata
  • 4 篇 qiao youming
  • 4 篇 gary l. mullen
  • 3 篇 perret ludovic
  • 3 篇 tsigaridas elias
  • 3 篇 drineas petros
  • 3 篇 gathen joachim v...
  • 3 篇 avron haim
  • 3 篇 krivine jean
  • 3 篇 giesbrecht mark
  • 3 篇 colton simon
  • 3 篇 chowdhury agniva
  • 3 篇 grochow joshua a...
  • 3 篇 von zur gathen j...
  • 3 篇 faugere jean-cha...
  • 3 篇 behr nicolas
  • 3 篇 london palma
  • 2 篇 babai l
  • 2 篇 muggleton stephe...

语言

  • 535 篇 英文
  • 70 篇 其他
  • 39 篇 中文
检索条件"任意字段=Computer Algebra and Polynomials: Applications of Algebra and Number Theory"
644 条 记 录,以下是201-210 订阅
排序:
number theoretic generalization of the monster denominator formula
arXiv
收藏 引用
arXiv 2017年
作者: Bringmann, Kathrin Kane, Ben Löbrich, Steffen Ono, Ken Rolen, Larry Mathematical Institute University of Cologne Weyertal 86-90 Cologne50931 Germany Department of Mathematics University of Hong Kong Pokfluam Hong Kong Department of Mathematics and Computer Science Emory University AtlantaGA30022 United States Hamilton Mathematics Institute School of Mathematics Trinity College Dublin 2 Ireland
The denominator formula for the Monster Lie algebra is the product expansion for the modular function j(z) − j(τ) in terms of the Hecke system of SL2(Z)-modular functions jn(τ). This formula can be reformulated enti...
来源: 评论
Provably Weak Instances of Ring-LWE Revisited  1
收藏 引用
35th Annual International Conference on the theory and applications of Cryptographic Techniques (EUROCRYPT)
作者: Castryck, Wouter Iliashenko, Ilia Vercauteren, Frederik Katholieke Univ Leuven ESAT COSIC Kasteelpk Arenberg 10 B-3001 Leuven Heverlee Belgium iMinds Kasteelpk Arenberg 10 B-3001 Leuven Heverlee Belgium Univ Ghent Vakgrp Wiskunde Krijgslaan 281-S22 B-9000 Ghent Belgium
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version of the ring learning with errors problem (RLWE) for two special families of defining polynomials, whose construction... 详细信息
来源: 评论
algebraic structures related to racah doubles  11th
Algebraic structures related to racah doubles
收藏 引用
Proceedings of the 11th International Workshop on Lie theory and Its applications in Physics, 2015
作者: Oste, Roy van der Jeugt, Joris Department of Applied Mathematics Computer Science and Statistics Ghent University Krijgslaan 281-S9 Gent9000 Belgium
In Oste and Van der Jeugt, SIGMA, 12 (2016), [13], we classified all pairs of recurrence relations connecting two sets of Hahn, dual Hahn or Racah polynomials of the same type but with different parameters. We examine...
来源: 评论
有限域上置换多项式的几种构造
收藏 引用
密码学报 2017年 第3期4卷 291-298页
作者: 查正邦 胡磊 洛阳师范学院数学科学学院 洛阳471934 密码科学技术国家重点实验室 北京100878 河南省大数据处理与分析重点实验室 洛阳471934 中国科学院信息工程研究所信息安全国家重点实验室 北京100093 中国科学院大学网络空间安全学院 北京1000495
置换多项式在代数学、组合学、数论、编码理论、密码学等领域中均有广泛而又重要的应用.近年来,置换多项式的研究取得一系列进展,研究者先后提出Akbary-Ghioca-Wang法则、分段构造法、交换构造法等方法来构造和证明置换.有限域上的置换... 详细信息
来源: 评论
On a real analog of Bezout inequality and the number of connected components of sign conditions
收藏 引用
PROCEEDINGS OF THE LONDON MATHEMATICAL SOCIETY 2016年 第1期112卷 115-145页
作者: Barone, Sal Basu, Saugata Georgia Inst Technol Sch Math Atlanta GA 30332 USA Purdue Univ Dept Math W Lafayette IN 47907 USA
Let R be a real closed field and Q(1), . . . , Q (l) is an element of R[X-1,...,X-k] such that for each i, 1 <= i <= l, deg(Q(i)) <= di. For 1 <= i <= l, denote by Q(i) = {Q(1),..., Q(i)}, Vi the real v... 详细信息
来源: 评论
Guide to Discrete Mathematics  1st ed. 2016
收藏 引用
丛书名: Texts in computer Science
2016年
作者: Gerard O'Regan
This stimulating textbook presents a broad and accessible guide to the fundamentals of discrete mathematics, highlighting how the techniques may be applied to various exciting areas in computing. The text is designed ...
来源: 评论
Some results concerning the explicit isomorphism problem over number fields  6th
Some results concerning the explicit isomorphism problem ove...
收藏 引用
6th International Conference on Mathematical Aspects of computer and Information Sciences, MACIS 2015
作者: Kutas, Péter Department of Mathematics and its Applications Central European University Budapest Hungary
We consider two problems. First let u be an element of a quaternion algebra B over (d√)Q(d) such that u is non-central and u2∈ . We relate the complexity of finding an element v′ such that uv′=−v′u and v′2 ∈ to... 详细信息
来源: 评论
Discrete algebraic Methods
收藏 引用
丛书名: De Gruyter Textbook
2016年
作者: Volker Diekert Manfred Kufleitner Gerhard Rosenberger Ulrich Hertrampf
The idea behind this book is to provide the mathematical foundations for assessing modern developments in the Information Age. It deepens and complements the basic concepts, but it also considers instructive and more ... 详细信息
来源: 评论
SETTING THE α-CUT OF FUZZY QUATERNION numberS THROUGH GRADUAL QUATERNION numberS  12
SETTING THE α-CUT OF FUZZY QUATERNION NUMBERS THROUGH GRADU...
收藏 引用
12th International Conference on Fuzzy Logic and Intelligent Technologies in Nuclear Science (FLINS)
作者: Sousa, Emmanuelly Santiago, Regivan Fed Univ Rio Grande Norte UFRN Dept Informat & Appl Math DIMAp Grp Log Language Informat Theory & Applicat LoLIT BR-59072970 Natal RN Brazil
Recently the notion of Quaternion Fuzzy numbers (QFN) was introduced in the literature [I]. The Quaternion algebra provides applications in many fields, like the representation of rotation and translation of a rigid b... 详细信息
来源: 评论
Which groups are amenable to proving exponent two for matrix multiplication?
arXiv
收藏 引用
arXiv 2017年
作者: Blasiak, Jonah Church, Thomas Cohn, Henry Grochow, Joshua A. Umans, Chris Department of Mathematics Drexel University PhiladelphiaPA United States Department of Mathematics Stanford University Palo AltoCA United States Microsoft Research New England One Memorial Drive CambridgeMA United States Departments of Computer Science and Mathematics University of Colorado BoulderCO United States Department of Computing and Mathematical Sciences California Institute of Technology PasadenaCA United States
The Cohn-Umans group-theoretic approach to matrix multiplication suggests embedding matrix multiplication into group algebra multiplication, and bounding ω in terms of the representation theory of the host group. Thi... 详细信息
来源: 评论