Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Korner, J.
and
Orlitsky, A.
1998.
Zero-error information theory.
IEEE Transactions on Information Theory,
Vol. 44,
Issue. 6,
p.
2207.
Wang, Jun
1998.
Proof of a conjecture on the Sperner property of the subgroup lattice of an abelianp-group.
Annals of Combinatorics,
Vol. 2,
Issue. 1,
p.
85.
Bezrukov, Sergei L.
1999.
On an equivalence in discrete extremal problems.
Discrete Mathematics,
Vol. 203,
Issue. 1-3,
p.
9.
Wang, Jun
and
Wang, Yi
2000.
Strong Sperner property of the subgroup lattice of an Abelianp-group.
Science in China Series A: Mathematics,
Vol. 43,
Issue. 7,
p.
693.
Bezrukov, Sergei L.
and
Leck, Uwe
2000.
Numbers, Information and Complexity.
p.
75.
Bey, Christian
and
Engel, Konrad
2000.
Numbers, Information and Complexity.
p.
45.
Коршунов, Алексей Дмитриевич
and
Korshunov, Aleksei Dmitrievich
2003.
Монотонные булевы функции.
Успехи математических наук,
Vol. 58,
Issue. 5,
p.
89.
Steele, J. Michael
and
Zhang, Yu
2003.
Nondifferentiability of the time constants of first-passage percolation.
The Annals of Probability,
Vol. 31,
Issue. 2,
Ahlswede, R.
Aydinian, H.
and
Khachatrian, L.H.
2003.
Maximal antichains under dimension constraints.
Discrete Mathematics,
Vol. 273,
Issue. 1-3,
p.
23.
Harper, L.H.
and
Dreier, D.
2003.
The edge-isoperimetric problem on the 600-vertex regular solid.
Linear Algebra and its Applications,
Vol. 368,
Issue. ,
p.
209.
Richards, Donald St. P.
2004.
Algebraic methods toward higher-order probability inequalities, II.
The Annals of Probability,
Vol. 32,
Issue. 2,
Ahlswede, R.
Aydinian, H.
and
Khachatrian, L. H.
2005.
Forbidden (0,1)-vectors in Hyperplanes of $$\mathbb{R}^{n}$$ : The unrestricted case.
Designs, Codes and Cryptography,
Vol. 37,
Issue. 1,
p.
151.
Ahlswede, R.
and
Aydinian, H.
2006.
Error control codes for parallel asymmetric channels.
p.
1768.
Yukich, J. E.
and
Zhang, Yu
2006.
Singularity points for first passage percolation.
The Annals of Probability,
Vol. 34,
Issue. 2,
Engel, Konrad
Kalinowski, Thomas
Labahn, Roger
Sill, Frank
and
Timmermann, Dirk
2006.
Algorithms for Leakage Reduction with Dual Threshold Design Techniques.
p.
1.
Ahlswede, R.
and
Aydinian, H.
2006.
General Theory of Information Transfer and Combinatorics.
Vol. 4123,
Issue. ,
p.
1056.
Crampton, J.
Martin, K.
and
Wild, P.
2006.
On Key Assignment for Hierarchical Access Control.
p.
98.
Tatsumi, H.
Miyakawa, M.
and
Mukaidono, M.
2006.
Upper and Lower Bounds on the Number of Disjunctive Forms.
p.
8.
Chan, Agnes
Liu, Xin
Noubir, Guevara
and
Thapa, Bishal
2007.
Broadcast Control Channel Jamming: Resilience and Identification of Traitors.
p.
2496.
Tague, Patrick
Li, Mingyan
and
Poovendran, Radha
2007.
Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution.
p.
1.