نتایج جستجو برای: chained ring
تعداد نتایج: 124553 فیلتر نتایج به سال:
in this note we introduce the notion of weak mccoy rings as a generalization of mccoy rings, and investigate their properties. also we show that, if is a semi-commutative ring, then is weak mccoy if and only if is weak mccoy.
The objective of this paper is to develop a high performance hash-based access method for main memory database systems. Chained bucket hashing is known to provide the fastest random access to a static file stored in main memory. For a dynamic file, however, chained bucket hashing is inappropriate because its address space cannot be adapted to the file size without total reorganization. Extendib...
We propose a method to recover the structure of a randomly permuted chained code and how to cryptanalyse cryptographic schemes based on these kinds of error coding. As application of these methods is a cryptographic schema using regular Low Density Parity Check (LDPC) Codes. This result prohibits the use of chained code and particularly regular LDPC codes on cryptography.
The structure and conformation of self-assembled monolayers (SAMs) derived from the adsorption of a specifically designed double-chained partially fluorinated thiol having the formula 12,12,13,13,14,14,15,15,16,16,17,17,18,18,19,19,19-heptadecafluoro-2-tetradecylnona-decane-1-thiol (2) onto the surface of evaporated gold were examined by ellipsometry, contact angle goniometry, polarization modu...
Let R be a commutative ring with identity such that R admits at least two maximal ideals. In this article, we associate a graph with R whose vertex set is the set of all proper ideals I of R such that I is not contained in the Jacobson radical of R and distinct vertices I and J are joined by an edge if and only if I and J are not comparable under the inclusion relation. The aim of this article ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید