Sciweavers

475 search results - page 32 / 95
» Z3-Connectivity with Independent Number 2
Sort
View
CRYPTO
2012
Springer
268views Cryptology» more  CRYPTO 2012»
12 years 9 days ago
Secret Sharing Schemes for Very Dense Graphs
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct the secret while every independent set in the graph does not get any informatio...
Amos Beimel, Oriol Farràs, Yuval Mintz
TMI
1998
75views more  TMI 1998»
13 years 9 months ago
Predicting error in rigid-body, point-based registration
— Guidance systems designed for neurosurgery, hip surgery, and spine surgery, and for approaches to other anatomy that is relatively rigid can use rigid-body transformations to a...
J. Michael Fitzpatrick, Jay B. West, Calvin R. Mau...
JGT
2007
130views more  JGT 2007»
13 years 9 months ago
Vertex partitions and maximum degenerate subgraphs
: Let G be a graph with maximum degree d ≥ 3 and ω(G) ≤ d, where ω(G) is the clique number of the graph G. Let p1 and p2 be two positive integers such that d = p1 + p2. In th...
Martín Matamala
ICALP
2009
Springer
14 years 10 months ago
Rumor Spreading in Social Networks
Social networks are an interesting class of graphs likely to become of increasing importance in the future, not only theoretically, but also for its probable applications to ad hoc...
Flavio Chierichetti, Silvio Lattanzi, Alessandro P...
DCC
2008
IEEE
14 years 9 months ago
Asymmetric Multi-level Diversity Coding
Symmetric multilevel diversity coding was introduced by Roche et al, where a set of K information sources is encoded by K encoders and the decoders reconstruct sources 1, . . . , ...
Soheil Mohajer, Chao Tian, Suhas N. Diggavi