Elements of Information Theory
Preface to the Second Edition. Preface to the First Edition. Acknowledgments for the Second Edition. Acknowledgments for the First Edition. 1. Introduction and Preview. 1.1 Prev...
Preface to the Second Edition. Preface to the First Edition. Acknowledgments for the Second Edition. Acknowledgments for the First Edition. 1. Introduction and Preview. 1.1 Prev...
Contracted Gaussian basis sets for molecular calculations are derived from uncontracted (12,8) and (12,9) sets for the neutral second row atoms, Z=11–18, and for the negative io...
An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. In this paper we present an in...
Entanglement purification protocols (EPP) and quantum error-correcting codes (QECC) provide two ways of protecting quantum states from interaction with the environment. In an EP...
FFTW is an implementation of the discrete Fourier transform (DFT) that adapts to the hardware in order to maximize performance. This paper shows that such an approach can yield ...
In view of rapid progress of computer capability, it is very desirable to have a reliable assessment of the usefulness of Gaussian-type orbitals as basis functions for large-sca...