標(biāo)題: Titlebook: Characters and Cyclotomic Fields in Finite Geometry; Bernhard Schmidt Book 2002 Springer-Verlag Berlin Heidelberg 2002 Barker sequences.Ci [打印本頁] 作者: 你太謙虛 時(shí)間: 2025-3-21 16:28
書目名稱Characters and Cyclotomic Fields in Finite Geometry影響因子(影響力)
書目名稱Characters and Cyclotomic Fields in Finite Geometry影響因子(影響力)學(xué)科排名
書目名稱Characters and Cyclotomic Fields in Finite Geometry網(wǎng)絡(luò)公開度
書目名稱Characters and Cyclotomic Fields in Finite Geometry網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Characters and Cyclotomic Fields in Finite Geometry被引頻次
書目名稱Characters and Cyclotomic Fields in Finite Geometry被引頻次學(xué)科排名
書目名稱Characters and Cyclotomic Fields in Finite Geometry年度引用
書目名稱Characters and Cyclotomic Fields in Finite Geometry年度引用學(xué)科排名
書目名稱Characters and Cyclotomic Fields in Finite Geometry讀者反饋
書目名稱Characters and Cyclotomic Fields in Finite Geometry讀者反饋學(xué)科排名
作者: 阻礙 時(shí)間: 2025-3-21 22:30 作者: Heart-Attack 時(shí)間: 2025-3-22 00:58
Bibliography,Abstract not available作者: 生意行為 時(shí)間: 2025-3-22 06:56
Index,Abstract not available作者: Self-Help-Group 時(shí)間: 2025-3-22 11:45
Characters and Cyclotomic Fields in Finite Geometry978-3-540-45797-8Series ISSN 0075-8434 Series E-ISSN 1617-9692 作者: 古董 時(shí)間: 2025-3-22 15:19
Bernhard SchmidtIncludes supplementary material: 作者: 古董 時(shí)間: 2025-3-22 19:23
Lecture Notes in Mathematicshttp://image.papertrans.cn/c/image/224038.jpg作者: Coronation 時(shí)間: 2025-3-22 22:41 作者: output 時(shí)間: 2025-3-23 01:38
978-3-540-44243-1Springer-Verlag Berlin Heidelberg 2002作者: Commodious 時(shí)間: 2025-3-23 08:38
Book 2002trix Conjecture and Ryser`s conjecture since decades. It is shown that there is no Barker sequence of length l with 13<1<4x10^(12). Finally, a conjecturally complete classification of all irreducible cyclic two-weight codes is obtained.作者: conservative 時(shí)間: 2025-3-23 13:08
0075-8434 objects. The new method of field descent for cyclotomic integers of presribed absolute value is developed. Applications include the first substantial progress towards the Circulant Hadamard Matrix Conjecture and Ryser`s conjecture since decades. It is shown that there is no Barker sequence of lengt作者: ARENA 時(shí)間: 2025-3-23 16:39 作者: chisel 時(shí)間: 2025-3-23 21:17
0075-8434 h l with 13<1<4x10^(12). Finally, a conjecturally complete classification of all irreducible cyclic two-weight codes is obtained.978-3-540-44243-1978-3-540-45797-8Series ISSN 0075-8434 Series E-ISSN 1617-9692 作者: 整理 時(shí)間: 2025-3-23 22:45
Characters and Cyclotomic Fields in Finite Geometry作者: Gerontology 時(shí)間: 2025-3-24 05:51 作者: 樣式 時(shí)間: 2025-3-24 10:18
Artturi Koivuniemi,Ilpo Vattulainen required to sustain soil health; however, maintaining K availability is a major challenge in organic matter-treated soil. In this context, mica waste, a high potassium-containing mineral, could be an alternative K source for arable soil. In this study, a series of experiments were conducted to eval作者: bioavailability 時(shí)間: 2025-3-24 13:31 作者: Ischemia 時(shí)間: 2025-3-24 18:13 作者: Hangar 時(shí)間: 2025-3-24 19:02
Axelle Verdonck,Jan Boon,Vidar Stevensr Imaging (DTI), which helps the physician to interrogate tissue with anisotropic (direction-specific) diffusion behavior that may be useful in rendering a diagnosis for a patient. In this chapter we will discuss images for common DTI acquisitions along with their strengths and weaknesses. We will s作者: gangrene 時(shí)間: 2025-3-24 23:53 作者: 條約 時(shí)間: 2025-3-25 04:55
Wenyue Xulications.Volume editor is an esteemed name in the field.Inc.Knowledge management (KM) is a set of relatively-new organizational activities that are aimed at improving knowledge, knowledge-related practices, organizational behaviors and decisions and organizational performance. KM focuses on knowled作者: 后天習(xí)得 時(shí)間: 2025-3-25 09:27
Raúl E. Sáezvelopment. is a practical, hands-on guide to building cloud-based solutions using the Office 365 platform. This groundbreaking offering from Microsoft provides enterprise-class collaborative solutions at an affordable price, and this book shows you how to use the Office 365 platform to easily build 作者: 母豬 時(shí)間: 2025-3-25 12:17 作者: Pruritus 時(shí)間: 2025-3-25 18:46 作者: neuron 時(shí)間: 2025-3-25 23:16 作者: admission 時(shí)間: 2025-3-26 02:57 作者: 要塞 時(shí)間: 2025-3-26 05:59
Conference proceedings 2014held in Bonn, Germany, in June 2014. The 34 full papers presented were carefully reviewed and selected from 143 submissions. The conference is a forum for researchers and practitioners working on various aspects of integer programming and combinatorial optimization. The aim is to present recent deve作者: 前奏曲 時(shí)間: 2025-3-26 09:37
Aggression and Retaliationt was widely accepted in Europe. It was not based simply on a calculation of tactical need, to beat a strong defence, but on a presumption that this was the way of aggressors. Whether atom bombs were scare or plentiful, the defence weak or strong, was irrelevant.作者: 驚惶 時(shí)間: 2025-3-26 14:35
Imperative vs. Functional Programmingis lower than from the same algal concentration in the epilimnion due to the low temperature and the limited time an individual spends in the hypolimnion. The results provide mechanistic support for the hypothesis that . chose their habitat according to an Ideal Free Distribution with Costs model.作者: hardheaded 時(shí)間: 2025-3-26 19:57
Study on the Acid Leaching of Metal Components in Bayer Red Mudulfuric acid solution is the most suitable as the leaching agent. When the leaching temperature is 90 °C, the liquid-solid ratio is 10:1, the leaching time is 150?min, and the mechanical stirring speed is 300?rpm, the leaching effect of the three metal elements is the best.作者: Cursory 時(shí)間: 2025-3-26 23:14 作者: Valves 時(shí)間: 2025-3-27 01:59 作者: 名字的誤用 時(shí)間: 2025-3-27 07:23 作者: 焦慮 時(shí)間: 2025-3-27 10:37
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/b/image/167148.jpg作者: ARIA 時(shí)間: 2025-3-27 14:25 作者: 刺耳的聲音 時(shí)間: 2025-3-27 18:06
Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithmsels highly strategic and resourceful adversaries, has become an important computational framework within multiagent systems. Unfortunately, SSG is ill-suited as a framework for handling opportunistic crimes, which are committed by criminals who are less strategic in planning attacks and more flexibl