We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Runtime Analysis of Competitive Co-evolutionary Algorithms for Maximin Optimisation of a Bilinear Function

    Co-evolutionary algorithms have a wide range of applications, such as in hardware design, evolution of strategies for board games, and patching...

    Per Kristian Lehre in Algorithmica
    Article Open access 27 April 2024
  2. Further results on covering codes with radius R and codimension \(tR+1\)

    Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco in Designs, Codes and Cryptography
    Article 27 April 2024
  3. Chain-imprimitive, flag-transitive 2-designs

    We consider 2-designs which admit a group of automorphisms that is flag-transitive and leaves invariant a chain of nontrivial point-partitions. We...

    Carmen Amarra, Alice Devillers, Cheryl E. Praeger in Designs, Codes and Cryptography
    Article Open access 20 April 2024
  4. Meet-in-the-middle attacks on AES with value constraints

    In meet-in-the-middle (MITM) attacks, the sizes of the precomputation tables determine the effectiveness. In this paper, value constraints are...

    **aoli Dong, Jun Liu, ... Jie Chen in Designs, Codes and Cryptography
    Article 18 April 2024
  5. Symmetric 2-adic complexity of Tang–Gong interleaved sequences from generalized GMW sequence pair

    Tang–Gong interleaved sequences constructed from the generalized GMW sequence pair are a class of binary sequences with optimal autocorrelation...

    Bo Yang, Kangkang He, ... Zibi **ao in Designs, Codes and Cryptography
    Article 16 April 2024
  6. Fast decoding of lifted interleaved linearized Reed–Solomon codes for multishot network coding

    Martínez-Peñas and Kschischang (IEEE Trans. Inf. Theory 65(8):4785–4803, 2019) proposed lifted linearized Reed–Solomon codes as suitable codes for...

    Hannes Bartz, Sven Puchinger in Designs, Codes and Cryptography
    Article Open access 16 April 2024
  7. Constructing linked systems of relative difference sets via Schur rings

    In the present paper, we study relative difference sets (RDSs) and linked systems of them. It is shown that a closed linked system of RDSs is always...

    Mikhail Muzychuk, Grigory Ryabov in Designs, Codes and Cryptography
    Article 16 April 2024
  8. Analysing Equilibrium States for Population Diversity

    Population diversity is crucial in evolutionary algorithms as it helps with global exploration and facilitates the use of crossover. Despite many...

    Johannes Lengler, Andre Opris, Dirk Sudholt in Algorithmica
    Article Open access 16 April 2024
  9. Min Orderings and List Homomorphism Dichotomies for Graphs and Signed Graphs

    Since the CSP dichotomy conjecture has been established, a number of other dichotomy questions have attracted interest, including one for list...

    Jan Bok, Richard C. Brewster, ... Arash Rafiey in Algorithmica
    Article 12 April 2024
  10. Flexible fingerprint cuckoo filter for information retrieval optimization in distributed network

    In a large-scale distributed network, a naming service is used to achieve location transparency and provide effective content discovery. However,...

    Wenhan Lian, **lin Wang, Jiali You in Distributed and Parallel Databases
    Article 11 April 2024
  11. New constructions of signed difference sets

    Zhiwen He, Tingting Chen, Gennian Ge in Designs, Codes and Cryptography
    Article 10 April 2024
  12. Jacobi polynomials for the first-order generalized Reed–Muller codes

    In this paper, we give the Jacobi polynomials for first-order generalized Reed–Muller codes. We show as a corollary the nonexistence of combinatorial...

    Ryosuke Yamaguchi in Designs, Codes and Cryptography
    Article Open access 08 April 2024
  13. Conflict-Free Coloring: Graphs of Bounded Clique-Width and Intersection Graphs

    A conflict-free coloring of a graph G is a (partial) coloring of its vertices such that every vertex u has a neighbor whose assigned color is unique...

    Sriram Bhyravarapu, Tim A. Hartmann, ... I. Vinod Reddy in Algorithmica
    Article 06 April 2024
  14. Ovoids of Q(6, q) of low degree

    Daniele Bartoli, Nicola Durante, Giovanni Giuseppe Grimaldi in Designs, Codes and Cryptography
    Article Open access 06 April 2024
  15. Anonymous attribute-based broadcast encryption with hidden multiple access structures

    Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the...

    Tran Viet Xuan Phuong in Designs, Codes and Cryptography
    Article Open access 06 April 2024
Did you find what you were looking for? Share feedback.