Search
Search Results
-
The state diagram of \(\chi \)
In symmetric cryptography, block ciphers, stream ciphers and permutations often make use of a round function and many round functions consist of a...
-
New constructions of constant dimension subspace codes with large sizes
Subspace codes have important applications in random network coding. It is a classical problem to construct subspace codes where both their size and...
-
In search of maximum non-overlap** codes
Non-overlap** codes are block codes that have arisen in diverse contexts of computer science and biology. Applications typically require finding...
-
Hardness estimates of the code equivalence problem in the rank metric
In this paper, we analyze the hardness of the Matrix Code Equivalence (
MCE ) problem for matrix codes endowed with the rank metric, and provide the... -
Improved bounds for codes correcting insertions and deletions
This paper studies the cardinality of codes correcting insertions and deletions. We give improved upper and lower bounds on code size. Our upper...
-
Computing and Combinatorics 29th International Conference, COCOON 2023, Hawaii, HI, USA, December 15–17, 2023, Proceedings, Part II
This two volume set volume LNCS 14422-14423 constitutes the refereed proceedings of the 29th International Conference, COCOON 2023, held in Hawaii,...
-
Combinatorial Algorithms 35th International Workshop, IWOCA 2024, Ischia, Italy, July 1–3, 2024, Proceedings
This book constitutes the refereed proceedings of the 35th International Workshop on Combinatorial Algorithms, IWOCA 2024, held in Ischia, Italy,...
-
Mathematical Optimization Theory and Operations Research 23rd International Conference, MOTOR 2024, Omsk, Russia, June 30–July 6, 2024, Proceedings
This book constitutes the refereed proceedings of the 23rd International Conference on Mathematical Optimization Theory and Operations Research,...
-
Modelling and Mining Networks 19th International Workshop, WAW 2024, Warsaw, Poland, June 3–6, 2024, Proceedings
This book constitutes the refereed proceedings of the 19th International Workshop on Modelling and Mining Networks, WAW 2024, held in Warsaw, Poland,...
-
Integer Programming and Combinatorial Optimization 25th International Conference, IPCO 2024, Wroclaw, Poland, July 3–5, 2024, Proceedings
This book constitutes the refereed proceedings of the 25th International Conference on Integer Programming and Combinatorial Optimization, IPCO 2024,...
-
Combinatorial Optimization 8th International Symposium, ISCO 2024, La Laguna, Tenerife, Spain, May 22–24, 2024, Revised Selected Papers
This book constitutes the refereed proceedings of the 8th International Symposium on Combinatorial Optimization, ISCO 2024, held in La Laguna,...
-
Theory and Applications of Models of Computation 18th Annual Conference, TAMC 2024, Hong Kong, China, May 13–15, 2024, Proceedings
This book constitutes the proceedings of the 18th Annual Conference on Theory and Applications of Models of Computation, TAMC 2024, which was held in...
-
Surrogate Constraints for Synchronized Energy Production/Consumption
We deal here with job scheduling under encapsulated renewable and non-renewable resource constraints, while relying on a case study related to energy... -
Neuron Pairs in Binarized Neural Networks Robustness Verification via Integer Linear Programming
In the context of classification, robustness verification of a neural network is the problem which consists in determining if small changes of inputs... -
Optimal Charging Station Location in a Linear Cycle Path with Deviations
Bicycle tourism is on the rise thanks to assisted-pedaling bikes, also known as e-bikes. While pedalling is still required on these bikes, they allow... -
On a Geometric Graph-Covering Problem Related to Optimal Safety-Landing-Site Location
We develop a set-cover based integer-programming approach to an optimal safety-landing-site location arising in the design of urban... -
A Bigraphs Paper of Sorts
Bigraphs are an expressive graphical modelling formalism to represent systems with a mix of both spatial and non-local connectivity. Currently it is... -
UCB Strategies in a Gaussian Two-Armed Bandit Problem
We consider the two-armed bandit problem in the application to batch data processing if there are two alternative processing methods with different a... -
Accelerated Stochastic Gradient Method with Applications to Consensus Problem in Markov-Varying Networks
Stochastic optimization is a vital field in the realm of mathematical optimization, finding applications in diverse domains ranging from operations... -
How to Use Barriers and Symmetric Regularization of Lagrange Function in Analysis of Improper Nonlinear Programming Problems
In the note, we present a new approach to numerical analysis of improper mathematical programming problems based on ideas of symmetrically...