We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 7,735 results
  1. DNA codes over \(GR(2^{3},d)[X]/\langle X^{2},2X \rangle\)

    The main results of this paper are in two directions. First, the family of finite local rings of length 4 whose annihilator of their maximal ideals...

    C. Álvarez-García, C. A. Castillo-Guillén, Mohamed Badaoui in Applicable Algebra in Engineering, Communication and Computing
    Article 13 July 2024
  2. Algebraic lattices coming from \({\mathbb {Z}}\)-modules generalizing ramified prime ideals in odd prime degree cyclic number fields

    Lattice theory has shown to be useful in information theory, and rotated lattices with high modulation diversity have been extensively studied as an...

    Antonio Aparecido de Andrade, Robson Ricardo de Araujo, ... Jefferson Luiz Rocha Bastos in Applicable Algebra in Engineering, Communication and Computing
    Article 08 July 2024
  3. Stable coherent systems

    We describe the notion of stability of coherent systems as a framework to deal with redundancy. We define stable coherent systems and show how this...

    Rodrigo Iglesias, Fatemeh Mohammadi, ... Henry P. Wynn in Applicable Algebra in Engineering, Communication and Computing
    Article 02 July 2024
  4. KI-Visionen oder kybernetische Perspektiven?

    E. W. Udo Küppers in Informatik Spektrum
    Article 28 June 2024
  5. Doubly even self-orthogonal codes from quasi-symmetric designs

    In this paper, we give a construction of doubly even self-orthogonal codes from quasi-symmetric designs. Especially, we study orbit matrices of...

    Dean Crnković, Doris Dumičić Danilović, ... Andrea Švob in Applicable Algebra in Engineering, Communication and Computing
    Article 24 June 2024
  6. On additive codes with one-rank hulls

    We study additive codes with 1-rank hulls and examine their properties for various dualities of the finite field of order 4. We give several...

    S. T. Dougherty, Serap Şahinkaya, Deniz Ustun in Applicable Algebra in Engineering, Communication and Computing
    Article 24 June 2024
  7. Card-Based Protocols for Private Set Intersection and Union

    Card-based cryptography aims to realize secure multiparty computation with physical cards. This paper is the first to address Private Set...

    Anastasiia Doi, Tomoki Ono, ... Mitsugu Iwamoto in New Generation Computing
    Article Open access 22 June 2024
  8. Four development stages of collective intelligence

    The new generation of artificial intelligence (AI) research initiated by Chinese scholars conforms to the needs of a new information environment...

    Article 22 June 2024
  9. Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model

    Card-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public...

    Takeshi Nakai, Keita Iwanari, ... Mitsugu Iwamoto in New Generation Computing
    Article Open access 21 June 2024
  10. Suno: potential, prospects, and trends

    Jiaxing Yu, Songruoyao Wu, ... Kejun Zhang in Frontiers of Information Technology & Electronic Engineering
    Article 20 June 2024
  11. Deterministic near-optimal distributed listing of cliques

    The importance of classifying connections in large graphs has been the motivation for a rich line of work on distributed subgraph finding that has...

    Keren Censor-Hillel, Dean Leitersdorf, David Vulakh in Distributed Computing
    Article 20 June 2024
  12. Printing Protocol: Physical ZKPs for Decomposition Puzzles

    Decomposition puzzles are pencil-and-paper logic puzzles that involve partitioning a rectangular grid into several regions to satisfy certain rules....

    Suthee Ruangwises, Mitsugu Iwamoto in New Generation Computing
    Article Open access 18 June 2024
  13. Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations

    This paper shows new kinds of card-based cryptographic protocols with a standard deck of cards using private operations. They are multi-party secure...

    Yoshifumi Manabe, Hibiki Ono in New Generation Computing
    Article 15 June 2024
  14. An Intelligent Lightweight Signing Signature and Secured Jellyfish Data Aggregation (LS3JDA) Based Privacy Preserving Model in Cloud

    Develo** a secured and accurate disease diagnosis framework in the healthcare cloud systems are still remains one of the crucial problems in recent...

    S. P. Rathinaeswari, V. Santhi in New Generation Computing
    Article 14 June 2024
  15. Optimal Prognostic Accuracy: Machine Learning Approaches for COVID-19 Prognosis with Biomarkers and Demographic Information

    The global emergence of the unprecedented COVID-19 pandemic in late 2019 has led to millions of infections and thousands of fatalities, profoundly...

    Sajid Hussain, Xu Songhua, ... Iftikhar Ali in New Generation Computing
    Article 07 June 2024
  16. On implementing SWMR registers from SWSR registers in systems with Byzantine failures

    The implementation of registers from (potentially) weaker registers is a classical problem in the theory of distributed computing. Since Lamport’s...

    **ng Hu, Sam Toueg in Distributed Computing
    Article 06 June 2024
Did you find what you were looking for? Share feedback.