Sciweavers

DCC
2010
IEEE
13 years 6 months ago
A characterization of the Grassmann embedding of H(q), with q even
In this note, we characterize the Grassmann embedding of H(q), q even, as the unique full embedding of H(q) in PG(12, q) for which each ideal line of H(q) is contained in a plane....
A. De Wispelaere, Joseph A. Thas, Hendrik Van Mald...
DCC
2010
IEEE
13 years 6 months ago
Enumeration of orthogonal Buekenhout unitals
In this paper we develop general techniques for enumerating orthogonal Buekenhout unitals embedded in two-dimensional translation planes. We then apply these techniques in the reg...
R. D. Baker, Gary L. Ebert, Kenneth L. Wantz
DCC
2010
IEEE
13 years 6 months ago
The maximum size of a partial 3-spread in a finite vector space over GF(2)
Let n 3 be an integer, let Vn(2) denote the vector space of dimension n over GF(2), and let c be the least residue of n modulo 3. We prove that the maximum number of 3-dimensional...
Saad El-Zanati, H. Jordon, G. F. Seelinger, Papa S...
DCC
2010
IEEE
13 years 6 months ago
On linear sets on a projective line
Linear sets generalise the concept of subgeometries in a projective space. They have many applications in finite geometry. In this paper we address two problems for linear sets: t...
Michel Lavrauw, Geertrui Van de Voorde
DCC
2010
IEEE
13 years 6 months ago
On hyperovals of polar spaces
We derive lower and upper bounds for the size of a hyperoval of a finite polar space of rank r {2, 3}. We give a computer-free proof for the uniqueness, up to isomorphism, of the...
Bart De Bruyn
DCC
2010
IEEE
13 years 6 months ago
Equidistant frequency permutation arrays and related constant composition codes
This paper introduces and studies the notion of an equidistant frequency permutation array (EFPA). An EFPA of length n = m, distance d and size v is defined to be a v
Sophie Huczynska
DCC
2010
IEEE
13 years 6 months ago
Efficient hybrid encryption from ID-based encryption
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until...
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
DCC
2010
IEEE
13 years 6 months ago
A study of (x(q + 1), x; 2, q)-minihypers
Ivan N. Landjev, Leo Storme
CGF
2008
109views more  CGF 2008»
13 years 6 months ago
A Resolution Independent Approach for the Accurate Rendering of Grooved Surfaces
This paper presents a method for the accurate rendering of path-based surface details such as grooves, scratches and similar features. The method is based on a continuous represen...
Carles Bosch, Xavier Pueyo, Stéphane M&eacu...
CGF
2008
78views more  CGF 2008»
13 years 6 months ago
Tangible Heritage: Production of Astrolabes on a Laser Engraver
The astrolabe, an analog computing device, used to be the iconic instrument of astronomers during the Middle Ages. It allowed a multitude of operations of practical astronomy whic...
G. Zotti