We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Sublinear Algorithms in T-Interval Dynamic Networks

    We consider standard T - interval dynamic networks , under the synchronous timing model and the broadcast CONGEST model. In a T - interval dynamic network ,...

    Irvan Jahja, Haifeng Yu in Algorithmica
    Article 12 July 2024
  2. Explicit constructions of NMDS self-dual codes

    Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...

    Dongchun Han, Hanbin Zhang in Designs, Codes and Cryptography
    Article 12 July 2024
  3. New spence difference sets

    James A. Davis, John Polhill, ... Jordan Webster in Designs, Codes and Cryptography
    Article Open access 10 July 2024
  4. Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation

    Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...

    Zhigao Zhang, Fanfei Song, ... Chuansheng Dong in Data Science and Engineering
    Article Open access 09 July 2024
  5. Around LCD group codes

    Javier de la Cruz, Wolfgang Willems in Designs, Codes and Cryptography
    Article 05 July 2024
  6. Vectorial negabent concepts: similarities, differences, and generalizations

    In Pasalic et al. (IEEE Trans Inf Theory 69:2702–2712, 2023), and in Anbar and Meidl (Cryptogr Commun 10:235–249, 2018), two different vectorial...

    Nurdagül Anbar, Sadmir Kudin, ... Alexandr Polujan in Designs, Codes and Cryptography
    Article Open access 05 July 2024
  7. Some self-dual codes and isodual codes constructed by matrix product codes

    In 2020, Cao et al. proved that any repeated-root constacyclic code is monomially equivalent to a matrix product code of simple-root constacyclic...

    Xu Pan, Hao Chen, Hongwei Liu in Designs, Codes and Cryptography
    Article 04 July 2024
  8. The NP-hard problem of computing the maximal sample variance over interval data is solvable in almost linear time with a high probability

    We consider the algorithm by Ferson et al. (Reliab Comput 11(3):207--233, 2005) designed for solving the NP-hard problem of computing the maximal...

    M. Rada, M. Černý, O. Sokol in computational complexity
    Article 03 July 2024
  9. Stagnation Detection in Highly Multimodal Fitness Landscapes

    Stagnation detection has been proposed as a mechanism for randomized search heuristics to escape from local optima by automatically increasing the...

    Amirhossein Rajabi, Carsten Witt in Algorithmica
    Article Open access 02 July 2024
  10. Some constacyclic BCH codes with good parameters

    BCH codes as a subclass of constacyclic BCH codes have been widely studied, while the results on the parameters of BCH codes over finite fields are...

    ** Li, Huilian Zhu, Shan Huang in Designs, Codes and Cryptography
    Article 02 July 2024
  11. Security analysis of the ISO standard \(\textsf{OFB}\)-\(\textsf{DRBG}\)

    Deterministic random bit generators (DRBGs) are essential tools in modern cryptography for generating secure and unpredictable random numbers. The...

    Woohyuk Chung, Hwigyeom Kim, ... Yeongmin Lee in Designs, Codes and Cryptography
    Article Open access 27 June 2024
  12. A survey of compositional inverses of permutation polynomials over finite fields

    In this paper, we survey on the recent results and methods in the study of compositional inverses of permutation polynomials over finite fields. In...

    Article 27 June 2024
  13. Constructions for t-designs and s-resolvable t-designs

    The purpose of the present paper is to introduce recursive methods for constructing simple t -designs, s -resolvable t -designs, and large sets of t -desi...

    Article Open access 27 June 2024
  14. Finding orientations of supersingular elliptic curves and quaternion orders

    An oriented supersingular elliptic curve is a curve which is enhanced with the information of an endomorphism. Computing the full endomorphism ring...

    Sarah Arpin, James Clements, ... Benjamin Wesolowski in Designs, Codes and Cryptography
    Article Open access 26 June 2024
  15. On the maximum size of variable-length non-overlap** codes

    Non-overlap** codes are a set of codewords such that any nontrivial prefix of each codeword is not a nontrivial suffix of any codeword in the set,...

    Geyang Wang, Qi Wang in Designs, Codes and Cryptography
    Article 25 June 2024
  16. Multi-view Heterogeneous Graph Neural Networks for Node Classification

    Recently, with graph neural networks (GNNs) becoming a powerful technique for graph representation, many excellent GNN-based models have been...

    ** Zeng, Fang-Yuan Lei, ... Qing-Yun Dai in Data Science and Engineering
    Article Open access 24 June 2024
  17. Parameterized Complexity of Streaming Diameter and Connectivity Problems

    We initiate the investigation of the parameterized complexity of Diameter and Connectivity in the streaming paradigm. On the positive end, we show...

    Jelle J. Oostveen, Erik Jan van Leeuwen in Algorithmica
    Article Open access 19 June 2024
Did you find what you were looking for? Share feedback.