Entity usage
From MaRDI portal
This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.
Showing below up to 50 results in range #51 to #100.
- A note on properties for a complementary graph and its tree graph: Label: en
- Genetic algorithms for the construction of Hadamard matrices with two circulant cores: Label: en
- A combinatorial characterization of two skew lines: Label: en
- Bound for solid burst error correction with Lee weight: Label: en
- On super vertex-magic labeling: Label: en
- The method of S-box construction: Label: en
- Some combinatorial constructions for optimal mixed-level supersaturated designs: Label: en
- Common fixed points for families of commutative transformations: Label: en
- The deductive IDEF1X data model of a tooling system: Label: en
- A key substitution attack on SFLASHv3: Label: en
- An unconditionally secure location-aware key management scheme for static sensor networks: Label: en
- The performance of TCP/IP over wireless ATM network: Label: en
- Theory and design ofm-ary balanced codes which are invariant under symbol permutation: Label: en
- Connected geodomination in graphs: Label: en
- A characterization of prefix n-power words: Label: en
- Weighted bipartite graph for locating optimal LSB substitution for secret embedding: Label: en
- An anonymous and flexible í-out-of-n electronic voting scheme: Label: en
- An efficient algorithm for the identification of isomorphic orthogonal arrays: Label: en
- New light on certain two level designs using Gröbner bases: Label: en
- Some generalizations of Rédei’s theorem: Label: en
- A sublinear time string prefix square detection algorithm: Label: en
- On the extending ofk-regular graphs and their strong defining spectrum: Label: en
- Path point cover: Label: en
- The spectrum of nested group divisible designs of typetn: Label: en
- A 3D geometric approach to face detection and facial expression recognition: Label: en
- Representation of primes as the sums of two squares in the golden section quadratic field: Label: en
- A new visual cryptography scheme for STS based access structures: Label: en
- Landau-Ramanujan keyed hash functions for message authentication: Label: en
- A search for primes from lesser primes: Label: en
- Analysis of the ϵ-algorithm to accelerate the convergence: Label: en
- A public-key threshold cryptosystem based on residue rings: Label: en
- An efficient multi-round anonymous auction protocol: Label: en
- A counting scheme and some algebraic properties of a class of special permutation patterns: Label: en
- User-friendly genetic algorithm: Label: en
- Complementary total domination in graphs: Label: en
- k-involution codes and related sets: Label: en
- Hamiltonian paths for involutions in the square of a Cayley graph: Label: en
- VLSI layout of Benes networks: Label: en
- Verification of the correctness of compiler optimization using co-induction: Label: en
- An asymptotic expansion for theq-binomial series using singularity analysis for generating functions: Label: en
- Brute force attacks on hash functions: Label: en
- Lict edge semientire graph of a planar graph: Label: en
- Edge geodetic number of a graph: Label: en
- On finding Fermat’s pairs: Label: en
- An algorithm for partitioning an integernas a sum ofkpositive integers: Label: en
- An algorithm for finding the number of shortest routes on square lattices: Label: en
- Information hiding at oblivious watermarking scheme upon alternative thresold in spatial domains: Label: en
- Security enhancement of key authentication schemes based on discrete logarithms: Label: en
- Comments on e-mail protocols providing forward secrecy: Label: en
- Enumerations of the maximum rectilinear crossing numbers of complete and complete multi-partite graphs: Label: en