Sciweavers

DCC
2010
IEEE
13 years 11 months ago
A characterization of the Grassmann embedding of H(q), with q even
In this note, we characterize the Grassmann embedding of H(q), q even, as the unique full embedding of H(q) in PG(12, q) for which each ideal line of H(q) is contained in a plane....
A. De Wispelaere, Joseph A. Thas, Hendrik Van Mald...
DCC
2010
IEEE
13 years 11 months ago
Enumeration of orthogonal Buekenhout unitals
In this paper we develop general techniques for enumerating orthogonal Buekenhout unitals embedded in two-dimensional translation planes. We then apply these techniques in the reg...
R. D. Baker, Gary L. Ebert, Kenneth L. Wantz
DCC
2010
IEEE
13 years 11 months ago
The maximum size of a partial 3-spread in a finite vector space over GF(2)
Let n 3 be an integer, let Vn(2) denote the vector space of dimension n over GF(2), and let c be the least residue of n modulo 3. We prove that the maximum number of 3-dimensional...
Saad El-Zanati, H. Jordon, G. F. Seelinger, Papa S...
DCC
2010
IEEE
13 years 11 months ago
On linear sets on a projective line
Linear sets generalise the concept of subgeometries in a projective space. They have many applications in finite geometry. In this paper we address two problems for linear sets: t...
Michel Lavrauw, Geertrui Van de Voorde
DCC
2010
IEEE
13 years 11 months ago
On hyperovals of polar spaces
We derive lower and upper bounds for the size of a hyperoval of a finite polar space of rank r {2, 3}. We give a computer-free proof for the uniqueness, up to isomorphism, of the...
Bart De Bruyn
DCC
2010
IEEE
13 years 11 months ago
Equidistant frequency permutation arrays and related constant composition codes
This paper introduces and studies the notion of an equidistant frequency permutation array (EFPA). An EFPA of length n = m, distance d and size v is defined to be a v
Sophie Huczynska
DCC
2010
IEEE
13 years 11 months ago
Efficient hybrid encryption from ID-based encryption
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until...
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
DCC
2010
IEEE
13 years 11 months ago
A study of (x(q + 1), x; 2, q)-minihypers
Ivan N. Landjev, Leo Storme
CGF
2008
109views more  CGF 2008»
13 years 11 months ago
A Resolution Independent Approach for the Accurate Rendering of Grooved Surfaces
This paper presents a method for the accurate rendering of path-based surface details such as grooves, scratches and similar features. The method is based on a continuous represen...
Carles Bosch, Xavier Pueyo, Stéphane M&eacu...
CGF
2008
78views more  CGF 2008»
13 years 11 months ago
Tangible Heritage: Production of Astrolabes on a Laser Engraver
The astrolabe, an analog computing device, used to be the iconic instrument of astronomers during the Middle Ages. It allowed a multitude of operations of practical astronomy whic...
G. Zotti