Publication | Date of Publication | Type |
---|
Combinatorial and geometric approaches to counting problems on linear matroids, graphic arrangements, and partial orders | 2024-01-29 | Paper |
OBDDs of a monotone function and of its prime implicants | 2023-01-25 | Paper |
Probing a set of hyperplanes by lines and related problems | 2023-01-18 | Paper |
FPT algorithms to enumerate and count acyclic and totally cyclic orientations | 2022-04-27 | Paper |
Extended formulations of lower-truncated transversal polymatroids | 2021-07-06 | Paper |
FPT algorithms exploiting carving decomposition for Eulerian orientations and ice-type models | 2018-06-15 | Paper |
Parametric multiroute flow and its application to multilink-attack network | 2018-05-24 | Paper |
How to Strengthen the Security of RSA-OAEP | 2017-07-27 | Paper |
Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel | 2017-07-12 | Paper |
Quantum Error Correction Beyond the Bounded Distance Decoding Limit | 2017-07-12 | Paper |
How to construct efficient signcryption schemes on elliptic curves | 2016-06-09 | Paper |
Parametric Multiroute Flow and Its Application to Robust Network with $$k$$ Edge Failures | 2015-10-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q2948433 | 2015-09-30 | Paper |
BDD Operations for Quantum Graph States | 2014-09-02 | Paper |
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption | 2014-08-21 | Paper |
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 | 2014-02-17 | Paper |
Proximity and Motion Planning on ℓ1-Rigid Planar Periodic Graphs | 2013-12-17 | Paper |
A construction method of matroidal networks | 2013-08-20 | Paper |
Ciphertext Policy Multi-dimensional Range Encryption | 2013-06-04 | Paper |
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function | 2012-10-23 | Paper |
Time-Specific Encryption from Forward-Secure Encryption | 2012-09-25 | Paper |
Calculating Average Joint Hamming Weight for Minimal Weight Conversion of d Integers | 2012-06-08 | Paper |
Revisiting Hyperbolic Voronoi Diagrams in Two and Higher Dimensions from Theoretical, Applied and Generalized Viewpoints | 2012-03-09 | Paper |
Matroid enumeration for incidence geometry | 2012-03-02 | Paper |
Distinguishability measures and entropies for general probabilistic theories | 2011-06-03 | Paper |
Physical Equivalence of Pure States and Derivation of Qubit in General Probabilistic Theories | 2010-12-24 | Paper |
Constructing Better KEMs with Partial Message Recovery | 2010-11-23 | Paper |
No-cloning theorem on quantum logics | 2010-08-17 | Paper |
Unconditionally Secure Electronic Voting | 2010-06-17 | Paper |
Efficient hybrid encryption from ID-based encryption | 2010-03-02 | Paper |
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations | 2010-02-09 | Paper |
The Role of Arbiters in Asymmetric Authentication Schemes | 2010-02-09 | Paper |
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions | 2010-01-14 | Paper |
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE | 2010-01-14 | Paper |
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes | 2010-01-07 | Paper |
Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use | 2009-12-03 | Paper |
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation | 2009-12-03 | Paper |
An improvement of discrete Tardos fingerprinting codes | 2009-10-14 | Paper |
Generic Construction of Stateful Identity Based Encryption | 2009-09-29 | Paper |
Conjunctive Broadcast and Attribute-Based Encryption | 2009-08-18 | Paper |
An approach for stream ciphers design based on joint computing over random and secret data | 2009-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q3632446 | 2009-06-11 | Paper |
Computational Geometry Analysis of Quantum State Space and Its Applications | 2009-05-20 | Paper |
Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations | 2009-04-29 | Paper |
Strong Anonymous Signatures | 2009-04-29 | Paper |
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange | 2009-04-23 | Paper |
Semantic security for the McEliece cryptosystem without random oracles | 2009-03-31 | Paper |
Introduction to the Special Issue on Information Theoretic Security | 2009-02-24 | Paper |
The Commitment Capacity of the Gaussian Channel Is Infinite | 2009-02-24 | Paper |
Orthogonality between Key Privacy and Data Privacy, Revisited | 2009-02-10 | Paper |
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services | 2009-01-22 | Paper |
Efficient Identity-Based Encryption with Tight Security Reduction | 2009-01-09 | Paper |
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC | 2008-12-21 | Paper |
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem | 2008-12-21 | Paper |
Modeling Block Decoding Approaches for the Fast Correlation Attack | 2008-12-21 | Paper |
A fibre bundle over manifolds of quantum channels and its application to quantum statistics | 2008-10-21 | Paper |
Relations Among Notions of Security for Identity Based Encryption Schemes | 2008-09-18 | Paper |
Algebraic Cryptanalysis of 58-Round SHA-1 | 2008-09-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q3522505 | 2008-09-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q3522510 | 2008-09-03 | Paper |
Error-correcting codes and cryptography | 2008-08-20 | Paper |
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol | 2008-07-25 | Paper |
An Authentication and Key Exchange Protocol for Secure Credential Services | 2008-06-17 | Paper |
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function | 2008-06-10 | Paper |
Formal Security Treatments for Signatures from Identity-Based Encryption | 2008-06-10 | Paper |
Bounded CCA2-Secure Encryption | 2008-05-15 | Paper |
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys | 2008-04-24 | Paper |
An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths | 2008-04-17 | Paper |
On the Key-Privacy Issue of McEliece Public-Key Encryption | 2008-04-17 | Paper |
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption | 2008-04-15 | Paper |
Trade-Off Traitor Tracing | 2008-04-11 | Paper |
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication | 2008-04-11 | Paper |
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function | 2008-04-11 | Paper |
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations | 2008-03-18 | Paper |
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application | 2008-03-18 | Paper |
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks | 2008-03-17 | Paper |
An Efficient Aggregate Shuffle Argument Scheme | 2008-03-07 | Paper |
Applied Cryptography and Network Security | 2008-02-19 | Paper |
Generating facets for the cut polytope of a graph by triangular elimination | 2008-01-07 | Paper |
Cryptography and Coding | 2007-11-28 | Paper |
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns | 2007-09-24 | Paper |
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA | 2007-09-24 | Paper |
Short Signature and Universal Designated Verifier Signature Without Random Oracles | 2007-09-24 | Paper |
An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge | 2007-09-11 | Paper |
Tag-KEM from Set Partial Domain One-Way Permutations | 2007-09-07 | Paper |
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT | 2007-09-07 | Paper |
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service | 2007-09-07 | Paper |
Geometry of optimal estimation scheme forSU(D) channels | 2007-05-07 | Paper |
Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
Information Security and Cryptology | 2006-11-14 | Paper |
Security in Communication Networks | 2006-10-10 | Paper |
Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
On the relationship between convex bodies related to correlation experiments with dichotomic observables | 2006-09-28 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |
NUMBERS OF PRIMAL AND DUAL BASES OF NETWORK FLOW AND UNIMODULAR INTEGER PROGRAMS | 2006-06-14 | Paper |
Two-party Bell inequalities derived from combinatorics via triangular elimination | 2006-01-13 | Paper |
Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
Information and Communications Security | 2005-08-19 | Paper |
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates | 2005-08-12 | Paper |
Comparison Between XL and Gröbner Basis Algorithms | 2005-08-12 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
Quantum versus deterministic counter automata | 2005-06-01 | Paper |
Standard pairs for lawrence-type matrices and their applications to several lawrence-type integer programs | 2005-04-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4654645 | 2005-03-08 | Paper |
ENUMERATING TRIANGULATIONS IN GENERAL DIMENSIONS | 2004-09-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4817513 | 2004-09-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4808681 | 2004-08-12 | Paper |
Fast Correlation Attack Algorithm with List Decoding and an Application | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3044507 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737262 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043927 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043942 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472418 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472481 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4474173 | 2004-08-04 | Paper |
Quantify entanglement by concurrence hierarchy | 2004-06-10 | Paper |
Quantum parameter estimation of a generalized Pauli channel | 2004-06-10 | Paper |
Phase-covariant quantum cloning | 2004-06-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450731 | 2004-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450768 | 2004-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4437102 | 2003-12-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4437110 | 2003-12-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4426688 | 2003-09-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4428331 | 2003-09-15 | Paper |
On the distribution of the peak-to-average power ratio in OFDM signals | 2003-08-19 | Paper |
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks | 2003-07-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4414691 | 2003-07-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413863 | 2003-07-21 | Paper |
Unconditionally Secure Anonymous Encryption and Group Authentication | 2003-07-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4408442 | 2003-06-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4408444 | 2003-06-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4708675 | 2003-06-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536262 | 2003-02-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4790439 | 2003-01-28 | Paper |
One-way probabilistic reversible and quantum one-counter automata. | 2003-01-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724598 | 2002-11-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724458 | 2002-09-01 | Paper |
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks | 2002-08-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724577 | 2002-07-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q2766854 | 2002-07-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4538131 | 2002-07-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4538175 | 2002-07-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4538192 | 2002-07-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4537992 | 2002-06-25 | Paper |
Dualistic computational algebraic analyses of primal and dual minimum cost flow problems on acyclic tournament graphs | 2002-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941193 | 2002-05-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4529990 | 2002-05-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945391 | 2002-04-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945399 | 2002-03-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707409 | 2002-03-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502513 | 2002-01-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502490 | 2002-01-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q2741391 | 2001-10-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q2742597 | 2001-09-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q2742648 | 2001-09-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q2743802 | 2001-09-17 | Paper |
Binary multilevel convolutional codes with unequal error protection capabilities | 2001-08-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707435 | 2001-04-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4761864 | 2001-02-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4525751 | 2001-01-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502636 | 2001-01-14 | Paper |
Algorithms for the longest common subsequence problem for multiple strings based on geometric maxima | 2000-11-08 | Paper |
Dynamic weighted Voronoi diagrams and weighted minimax matching of two corresponding point sets | 2000-10-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4505400 | 2000-09-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945044 | 2000-09-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945041 | 2000-08-24 | Paper |
Restriction, terms and nonlinearity of Boolean functions | 2000-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4763620 | 2000-07-04 | Paper |
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography | 2000-06-07 | Paper |
Relating differential distribution tables to other properties of substitution boxes | 2000-06-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4937179 | 2000-02-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4937204 | 2000-02-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4263443 | 2000-02-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4935166 | 2000-01-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4703474 | 1999-12-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4705029 | 1999-12-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4705041 | 1999-12-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4703857 | 1999-12-01 | Paper |
Applications of error-control coding | 1999-11-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4253355 | 1999-11-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4253356 | 1999-11-08 | Paper |
A New Approach to the Analysis of Free Rotations of Rigid Bodies | 1999-11-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4267811 | 1999-10-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4267826 | 1999-10-20 | Paper |
Enhanced \(A^{*}\) algorithms for multiple alignments: optimal alignments for several sequences and k-opt approximate alignments for large cases | 1999-01-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3839179 | 1998-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373645 | 1998-06-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373627 | 1998-05-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3840096 | 1998-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341696 | 1997-12-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4354783 | 1997-09-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341790 | 1997-07-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341706 | 1997-06-18 | Paper |
On classes of rate k/(k+1) convolutional codes and their decoding techniques | 1997-05-12 | Paper |
\(\varepsilon\)-approximations of \(k\)-label spaces | 1997-02-28 | Paper |
A new unifying heuristic algorithm for the undirected minimum cut problems using minimum range cut algorithms | 1996-07-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4314047 | 1995-01-08 | Paper |
A design of Reed-Solomon decoder with systolic-array structure | 1995-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279582 | 1994-09-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279603 | 1994-03-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279680 | 1994-02-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279702 | 1994-02-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279527 | 1994-02-17 | Paper |
Generalized concatenated codes for channels where unidirectional byte errors are predominant | 1994-02-07 | Paper |
Orthogonal weightet linear \(L_ 1\) and \(L_ \infty\) approximation and applications | 1993-08-10 | Paper |
Human Identification Through Insecure Channel | 1993-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4038776 | 1993-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4028885 | 1993-03-28 | Paper |
Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference | 1992-06-27 | Paper |
Finding k points with minimum diameter and related problems | 1991-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3356233 | 1991-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3356234 | 1991-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3356240 | 1991-01-01 | Paper |
Some classes of burst asymmetric or unidirectional error correcting codes | 1990-01-01 | Paper |
Computing simple circuits from a set of line segments | 1990-01-01 | Paper |
Locating a robot with angle measurements | 1990-01-01 | Paper |
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3359634 | 1990-01-01 | Paper |
Some new binary codes correcting asymmetric/unidirectional errors | 1990-01-01 | Paper |
A linear-time algorithm for linear \(L_ 1\) approximation of points | 1989-01-01 | Paper |
Notes on oriented depth-first search and longest paths | 1989-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3495234 | 1989-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3495236 | 1989-01-01 | Paper |
Geometric relations among Voronoi diagrams | 1988-01-01 | Paper |
Computing the volume of the union of spheres | 1988-01-01 | Paper |
On the convexity of the multiplicative version of Karmarkar's potential function | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3803032 | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3805737 | 1988-01-01 | Paper |
Shortest path between two simple polygons | 1987-01-01 | Paper |
EXTENSIONS OF THE MULTIPLICATIVE PENALTY FUNCTION METHOD FOR LINEAR PROGRAMMING | 1987-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3782342 | 1987-01-01 | Paper |
Dynamic orthogonal segment intersection search | 1987-01-01 | Paper |
A Construction Method of High-Speed Decoders Using ROM's for Bose–Chaudhuri–Hocquenghem and Reed–Solomon Codes | 1987-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3793937 | 1987-01-01 | Paper |
Visibility of disjoint polygons | 1986-01-01 | Paper |
A multiplicative barrier function method for linear programming | 1986-01-01 | Paper |
Efficient Algorithms for Geometric Graph Search Problems | 1986-01-01 | Paper |
WORST-CASE ANALYSIS FOR PLANAR MATCHING AND TOUR HEURISTICS WITH BUCKETING TECHNIQUES AND SPACEFILLING CURVES | 1986-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3734308 | 1986-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3768247 | 1986-01-01 | Paper |
On combinatorial structures of line drawings of polyhedra | 1985-01-01 | Paper |
Voronoi Diagram in the Laguerre Geometry and Its Applications | 1985-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3716294 | 1985-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3741563 | 1985-01-01 | Paper |
PRACTICAL EFFICIENCIES OF EXISTING SHORTEST-PATH ALGORITHMS AND A NEW BUCKET ALGORITHM | 1984-01-01 | Paper |
NETWORK-FLOW ALGORITHMS FOR LOWER-TRUNCATED TRANSVERSAL POLYMATROIDS | 1983-01-01 | Paper |
Finding the connected components and a maximum clique of an intersection graph of rectangles in the plane | 1983-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3677204 | 1983-01-01 | Paper |
ON THE PRACTICAL EFFICIENCY OF VARIOUS MAXIMUM FLOW ALGORITHMS | 1983-01-01 | Paper |
Finding connected components of an intersection graph of squares in the Euclidean plane | 1982-01-01 | Paper |
Generalized tensor product codes | 1981-01-01 | Paper |
A new multilevel coding method using error-correcting codes | 1977-01-01 | Paper |
Correction to 'A New Multilevel Coding Method Using Error-Correcting Codes' | 1977-01-01 | Paper |
A theory of two-dimensional cyclic codes | 1977-01-01 | Paper |
A construction method for path-invariant comma-free codes (Corresp.) | 1974-01-01 | Paper |
Two-dimensional Fire codes | 1973-01-01 | Paper |
A theory of two-dimensional linear recurring arrays | 1972-01-01 | Paper |