Sciweavers

1996 search results - page 84 / 400
» Financial Theory 2
Sort
View
DM
1999
61views more  DM 1999»
13 years 9 months ago
Some codes related to BCH-codes of low dimension
We construct a large number of record-breaking binary, ternary and quaternary codes. Our methods involve the study of BCH-codes over larger fields, concatenation, construction X a...
Yves Edel, Jürgen Bierbrauer
AML
2011
322views Mathematics» more  AML 2011»
13 years 5 months ago
A dedekind finite borel set
In this paper we prove three theorems about the theory of Borel sets in models of ZF without any form of the axiom of choice. We prove that if B ⊆ 2ω is a Gδσ-set then either...
Arnold W. Miller
IJNSEC
2010
105views more  IJNSEC 2010»
13 years 4 months ago
A Note on the Constructions of Orthomorphic Permutations
Orthomorphic permutations have important applications in the design of block ciphers. A practical algorithm is derived to generate all orthomorphic permutations over Fm 2 , and it...
Jianqin Zhou
ISSAC
2007
Springer
112views Mathematics» more  ISSAC 2007»
14 years 4 months ago
G-graphs for the cage problem: a new upper bound
Constructing some regular graph with a given girth, a given degree and the fewest possible vertices is a hard problem. This problem is called the cage graph problem and has some l...
Alain Bretto, Luc Gillibert
SIGIR
2010
ACM
13 years 8 months ago
Information-based models for ad hoc IR
We introduce in this paper the family of information-based models for ad hoc information retrieval. These models draw their inspiration from a long-standing hypothesis in IR, name...
Stéphane Clinchant, Éric Gaussier