We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. New families of quaternionic Hadamard matrices

    Santiago Barrera Acevedo, Heiko Dietrich, Corey Lionis in Designs, Codes and Cryptography
    Article Open access 18 June 2024
  2. Graph-Enhanced Prompt Learning for Personalized Review Generation

    Personalized review generation is significant for e-commerce applications, such as providing explainable recommendation and assisting the composition...

    **aoru Qu, Yifan Wang, ... Jun Gao in Data Science and Engineering
    Article Open access 18 June 2024
  3. A dynamic C-V2X anonymous authentication and group key agreement protocol

    At present, in addressing security challenges within 5 G-era Vehicular Ad-Hoc Networks (VANET), a new protocol has been designed in this paper, named...

    Beibei Cui, Wei He, Yan Cui in International Journal of Information Security
    Article 18 June 2024
  4. Algorithms for Matrix Multiplication via Sampling and Opportunistic Matrix Multiplication

    As proposed by Karppa and Kaski (in: Proceedings 30th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2019) a novel “broken" or "opportunistic"...

    David G. Harris in Algorithmica
    Article 17 June 2024
  5. Bases for Riemann–Roch spaces of linearized function fields with applications to generalized algebraic geometry codes

    Several applications of function fields over finite fields, or equivalently, algebraic curves over finite fields, require computing bases for...

    Horacio Navarro in Designs, Codes and Cryptography
    Article Open access 15 June 2024
  6. Channel-Enhanced Contrastive Cross-Domain Sequential Recommendation

    Sequential recommendation help users find interesting items by modeling the dynamic user-item interaction sequences. Due to the data sparseness...

    Liu Yufang, Wang Shaoqing, ... Sun Fuzhen in Data Science and Engineering
    Article Open access 14 June 2024
  7. Online Unit Profit Knapsack with Predictions

    A variant of the online knapsack problem is considered in the setting of predictions. In Unit Profit Knapsack, the items have unit profit, i.e., the...

    Joan Boyar, Lene M. Favrholdt, Kim S. Larsen in Algorithmica
    Article Open access 13 June 2024
  8. Algebraically Structured LWE, Revisited

    In recent years, there has been a proliferation of algebraically structured Learning With Errors (LWE) variants, including Ring-LWE, Module-LWE,...

    Chris Peikert, Zachary Pepin in Journal of Cryptology
    Article 13 June 2024
  9. Optimal ternary locally repairable codes

    Locally repairable codes (LRCs) are linear codes with locality properties for code symbols, which have important applications in distributed storage...

    Jie Hao, Shu-Tao **a, ... Yixian Yang in Designs, Codes and Cryptography
    Article 13 June 2024
  10. Further improvements of the estimation of key enumeration with applications to solving LWE

    In post-quantum cryptography, Learning With Errors (LWE) is one of the dominant underlying mathematical problems. The dual attack is one of the main...

    Alessandro Budroni, Erik Mårtensson in Cryptography and Communications
    Article Open access 13 June 2024
  11. Email bombing attack detection and mitigation using machine learning

    Email bombing, a growingly prevalent and destructive cyber attack, involves inundating a target’s email inbox with subscription confirmation messages...

    Sanjeev Shukla, Manoj Misra, Gaurav Varshney in International Journal of Information Security
    Article 13 June 2024
  12. Approximate and Randomized Algorithms for Computing a Second Hamiltonian Cycle

    In this paper we consider the following problem: Given a Hamiltonian graph G , and a Hamiltonian cycle C of G , can we compute a second Hamiltonian...

    Argyrios Deligkas, George B. Mertzios, ... Viktor Zamaraev in Algorithmica
    Article Open access 12 June 2024
  13. An asymptotic property of quaternary additive codes

    Jürgen Bierbrauer, Stefano Marcugini, Fernanda Pambianco in Designs, Codes and Cryptography
    Article 12 June 2024
  14. Circular external difference families: construction and non-existence

    The circular external difference family and its strong version are of great significance both in theory and in applications. In this paper, we apply...

    Huawei Wu, **g Yang, Keqin Feng in Designs, Codes and Cryptography
    Article 12 June 2024
  15. External codes for multiple unicast networks via interference alignment

    We introduce a formal framework to study the multiple unicast problem for a coded network in which the network code is linear over a finite field and...

    F. R. Kschischang, F. Manganiello, ... K. Savary in Designs, Codes and Cryptography
    Article Open access 10 June 2024
  16. On prefer-one sequences

    We study the sequences generated by prefer-one rule with different initial vectors. Firstly, we give upper bounds of their periods and for initial...

    Yupeng Jiang, Ming Li, ... Dongdai Lin in Designs, Codes and Cryptography
    Article 10 June 2024
  17. On the classification of skew Hadamard matrices of order \(\varvec{36}\) and related structures

    Two skew Hadamard matrices are considered SH -equivalent if they are similar by a signed permutation matrix. This paper determines the number of SH -ine...

    Makoto Araya, Masaaki Harada, ... Behruz Tayfeh-Rezaie in Designs, Codes and Cryptography
    Article 07 June 2024
  18. Erdos: A Novel Blockchain Consensus Algorithm with Equitable Node Selection and Deterministic Block Finalization

    The introduction of blockchain technology has brought about significant transformation in the realm of digital transactions, providing a secure and...

    Buti Sello, Jianming Yong, **aohui Tao in Data Science and Engineering
    Article Open access 06 June 2024
Did you find what you were looking for? Share feedback.