We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,402 results
  1. Generalized partially bent functions, generalized perfect arrays, and cocyclic Butson matrices

    In a recent survey, Schmidt compiled equivalences between generalized bent functions, group invariant Butson Hadamard matrices, and abelian splitting...

    J. A. Armario, R. Egan, D. L. Flannery in Cryptography and Communications
    Article Open access 23 August 2023
  2. Families of multi-level Legendre-like arrays

    Families of new, multi-level integer 2 D arrays are introduced here as an extension of the well-known binary Legendre sequences that are derived from...

    Timothy Petersen, Benjamin Cavy, ... Imants Svalbe in Annals of Mathematics and Artificial Intelligence
    Article Open access 02 November 2023
  3. Low-complexity arrays of patch signature for efficient ancient coin retrieval

    We present a new recognition framework for ancient coins struck from the same die. It is called Low-complexity Arrays of Patch Signatures. To...

    Florian Lardeux, Petra Gomez-Krämer, Sylvain Marchand in Pattern Analysis and Applications
    Article 19 June 2024
  4. Generalized nonconvex regularization for tensor RPCA and its applications in visual inpainting

    Abstract

    As a demonstrated and foremost approach of extracting the key features from corrupted observations, tensor robust principal component...

    Feng Zhang, Hailin Wang, ... Jianjun Wang in Applied Intelligence
    Article 05 July 2023
  5. eGHWT: The Extended Generalized Haar–Walsh Transform

    Extending computational harmonic analysis tools from the classical setting of regular lattices to the more general setting of graphs and networks is...

    Naoki Saito, Yiqun Shao in Journal of Mathematical Imaging and Vision
    Article Open access 05 January 2022
  6. Generalized binary arrays from quasi-orthogonal cocycles

    Generalized perfect binary arrays (GPBAs) were used by Jedwab to construct perfect binary arrays. A non-trivial GPBA can exist only if its energy is...

    J. A. Armario, D. L. Flannery in Designs, Codes and Cryptography
    Article 19 March 2019
  7. Quantum image encryption algorithm based on generalized Arnold transform and Logistic map

    In the era of big data, image security and real-time processing become more and more important and increasingly difficult to satisfy. To improve the...

    Wen-Wen Hu, Ri-Gui Zhou, ... Jia Luo in CCF Transactions on High Performance Computing
    Article 04 August 2020
  8. On security properties of all-or-nothing transforms

    All-or-nothing transforms have been defined as bijective map**s on all s -tuples over a specified finite alphabet. These map**s are required to...

    Navid Nasr Esfahani, Douglas R. Stinson in Designs, Codes and Cryptography
    Article 11 October 2021
  9. Large sets with multiplicity

    Large sets of combinatorial designs has always been a fascinating topic in design theory. These designs form a partition of the whole space into...

    Tuvi Etzion, Junling Zhou in Designs, Codes and Cryptography
    Article 20 May 2021
  10. MinJoin++: a fast algorithm for string similarity joins under edit distance

    We study the problem of computing similarity joins under edit distance on a set of strings. Edit similarity joins is a fundamental problem in...

    Nikolai Karpov, Haoyu Zhang, Qin Zhang in The VLDB Journal
    Article 21 August 2023
  11. Working Memory for Online Memory Binding Tasks: A Hybrid Model

    Working memory is the brain module that holds and manipulates information online. In this work, we design a hybrid model in which a simple...

    Seyed Mohammad Mahdi Heidarpoor Yazdi, Abdolhossein Abbassian in SN Computer Science
    Article 27 November 2021
  12. Combinatorial Properties of Fibonacci Arrays

    The non-trivial extension of Fibonacci words to Fibonacci arrays was proposed by Apostolico and Brimkov in order to study repetitions in arrays. In...
    Manasi S. Kulkarni, Kalpana Mahalingam, Sivasankar Mohankumar in Theory and Applications of Models of Computation
    Conference paper 2019
  13. Efficient FPGA implementation for sound source separation using direction-informed multichannel non-negative matrix factorization

    Sound source separation (SSS) is a fundamental problem in audio signal processing, aiming to recover individual audio sources from a given mixture. A...

    Philipp Diel, Antonio J. Muñoz-Montoro, ... Jose Ranilla in The Journal of Supercomputing
    Article Open access 06 March 2024
  14. Image thresholding method based on Tsallis entropy correlation

    Image segmentation is an initial task in many vision-based systems and plays an important role in the processes of image analysis, target recognition...

    Shaoxun Wang, Jiulun Fan in Multimedia Tools and Applications
    Article 11 May 2024
  15. Status of three classes of sequences

    Pseudorandom sequences, sometimes shortened as sequences, have played a key role in the applications of digital communications, cryptography and...

    G. Gong, Z.L. Wang in Cryptography and Communications
    Article 02 August 2022
  16. A Learned Prefix Bloom Filter for Spatial Data

    Learned bloom filter (LBF) model has been proposed in recent work to replace the traditional bloom filter (BF). It can reduce the needed amount of...
    Beiji Zou, Meng Zeng, ... Zhi Chen in Database and Expert Systems Applications
    Conference paper 2022
  17. Highly accurate memristor modelling using MOS transistor for analog applications

    Memristor technology has grown at a breakneck pace over the last decade, with the promise to transform data processing and storage. A memristor is a...

    K. Soni, Satyajeet Sahoo in Multimedia Tools and Applications
    Article 20 January 2024
  18. Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction

    Protecting software from illegal reverse engineering and malicious hackers is often remedied through either legal or technical means. In the...
    J. Todd McDonald, Ramya K. Manikyam, ... James Carambat in E-Business and Telecommunications
    Conference paper 2023
  19. Heuristically Enhanced IPO Algorithms for Covering Array Generation

    The construction of covering arrays (CAs) with a small number of rows is a difficult optimization problem. CAs generated by greedy methods are often...
    Michael Wagner, Ludwig Kampel, Dimitris E. Simos in Combinatorial Algorithms
    Conference paper 2021
Did you find what you were looking for? Share feedback.