Contents
-
Publicly AvailableFrontmatterNovember 14, 2014
-
Requires Authentication UnlicensedFunctional limit theorems for high-level subcritical branching processes in random environmentLicensedNovember 14, 2014
-
Requires Authentication UnlicensedEffective attack on the McEliece cryptosystem based on Reed-Muller codesLicensedNovember 14, 2014
-
Requires Authentication UnlicensedCalculating the number of solutions of a difference equationLicensedNovember 14, 2014
-
Requires Authentication UnlicensedGenerating functions and the Myerson vector in communication networksLicensedNovember 14, 2014
-
Requires Authentication UnlicensedAsymptotic normality of numbers of non-occurring values of m-dependent random variablesLicensedNovember 14, 2014