We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. Parameterized Complexity of Streaming Diameter and Connectivity Problems

    We initiate the investigation of the parameterized complexity of Diameter and Connectivity in the streaming paradigm. On the positive end, we show...

    Jelle J. Oostveen, Erik Jan van Leeuwen in Algorithmica
    Article Open access 19 June 2024
  2. Approximation Algorithms for the Two-Watchman Route in a Simple Polygon

    The two-watchman route problem is that of computing a pair of closed tours in an environment so that the two tours together see the whole environment...

    Bengt J. Nilsson, Eli Packer in Algorithmica
    Article Open access 19 June 2024
  3. Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers

    Cryptanalysis of modern symmetric ciphers may be done by using linear equation systems with multiple right hand sides, which describe the encryption...

    Isaac A. Canales-Martínez, Igor Semaev in Designs, Codes and Cryptography
    Article 18 June 2024
  4. New families of quaternionic Hadamard matrices

    Santiago Barrera Acevedo, Heiko Dietrich, Corey Lionis in Designs, Codes and Cryptography
    Article Open access 18 June 2024
  5. Graph-Enhanced Prompt Learning for Personalized Review Generation

    Personalized review generation is significant for e-commerce applications, such as providing explainable recommendation and assisting the composition...

    **aoru Qu, Yifan Wang, ... Jun Gao in Data Science and Engineering
    Article Open access 18 June 2024
  6. Algorithms for Matrix Multiplication via Sampling and Opportunistic Matrix Multiplication

    As proposed by Karppa and Kaski (in: Proceedings 30th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2019) a novel “broken" or "opportunistic"...

    David G. Harris in Algorithmica
    Article 17 June 2024
  7. Bases for Riemann–Roch spaces of linearized function fields with applications to generalized algebraic geometry codes

    Several applications of function fields over finite fields, or equivalently, algebraic curves over finite fields, require computing bases for...

    Horacio Navarro in Designs, Codes and Cryptography
    Article Open access 15 June 2024
  8. Channel-Enhanced Contrastive Cross-Domain Sequential Recommendation

    Sequential recommendation help users find interesting items by modeling the dynamic user-item interaction sequences. Due to the data sparseness...

    Liu Yufang, Wang Shaoqing, ... Sun Fuzhen in Data Science and Engineering
    Article Open access 14 June 2024
  9. Online Unit Profit Knapsack with Predictions

    A variant of the online knapsack problem is considered in the setting of predictions. In Unit Profit Knapsack, the items have unit profit, i.e., the...

    Joan Boyar, Lene M. Favrholdt, Kim S. Larsen in Algorithmica
    Article Open access 13 June 2024
  10. Optimal ternary locally repairable codes

    Locally repairable codes (LRCs) are linear codes with locality properties for code symbols, which have important applications in distributed storage...

    Jie Hao, Shu-Tao **a, ... Yixian Yang in Designs, Codes and Cryptography
    Article 13 June 2024
  11. Approximate and Randomized Algorithms for Computing a Second Hamiltonian Cycle

    In this paper we consider the following problem: Given a Hamiltonian graph G , and a Hamiltonian cycle C of G , can we compute a second Hamiltonian...

    Argyrios Deligkas, George B. Mertzios, ... Viktor Zamaraev in Algorithmica
    Article Open access 12 June 2024
  12. An asymptotic property of quaternary additive codes

    Jürgen Bierbrauer, Stefano Marcugini, Fernanda Pambianco in Designs, Codes and Cryptography
    Article 12 June 2024
  13. Circular external difference families: construction and non-existence

    The circular external difference family and its strong version are of great significance both in theory and in applications. In this paper, we apply...

    Huawei Wu, **g Yang, Keqin Feng in Designs, Codes and Cryptography
    Article 12 June 2024
  14. External codes for multiple unicast networks via interference alignment

    We introduce a formal framework to study the multiple unicast problem for a coded network in which the network code is linear over a finite field and...

    F. R. Kschischang, F. Manganiello, ... K. Savary in Designs, Codes and Cryptography
    Article Open access 10 June 2024
  15. PECC: parallel expansion based on clustering coefficient for efficient graph partitioning

    In the pursuit of graph processing performance, graph partitioning, as a crucial preprocessing step, has been widely concerned. Based on an in-depth...

    Chengcheng Shi, Zhen** **e in Distributed and Parallel Databases
    Article 10 June 2024
  16. On prefer-one sequences

    We study the sequences generated by prefer-one rule with different initial vectors. Firstly, we give upper bounds of their periods and for initial...

    Yupeng Jiang, Ming Li, ... Dongdai Lin in Designs, Codes and Cryptography
    Article 10 June 2024
  17. On the classification of skew Hadamard matrices of order \(\varvec{36}\) and related structures

    Two skew Hadamard matrices are considered SH -equivalent if they are similar by a signed permutation matrix. This paper determines the number of SH -ine...

    Makoto Araya, Masaaki Harada, ... Behruz Tayfeh-Rezaie in Designs, Codes and Cryptography
    Article 07 June 2024
  18. Erdos: A Novel Blockchain Consensus Algorithm with Equitable Node Selection and Deterministic Block Finalization

    The introduction of blockchain technology has brought about significant transformation in the realm of digital transactions, providing a secure and...

    Buti Sello, Jianming Yong, **aohui Tao in Data Science and Engineering
    Article Open access 06 June 2024
  19. Indicator functions, v-numbers and Gorenstein rings in the theory of projective Reed–Muller-type codes

    For projective Reed–Muller-type codes we give a global duality criterion in terms of the v-number and the Hilbert function of a vanishing ideal. As...

    Manuel González-Sarabia, Humberto Muñoz-George, ... Rafael H. Villarreal in Designs, Codes and Cryptography
    Article 05 June 2024
Did you find what you were looking for? Share feedback.