A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle Fulltext Access 9 Pages 2016
An integer programming model for protein structure prediction using the 3D-HP side chain model Fulltext Access 9 Pages 2016
Factorization of network reliability with perfect nodes I: Introduction and statements Fulltext Access 9 Pages 2016
Polynomial-time algorithms for Subgraph Isomorphism in small graph classes of perfect graphs Fulltext Access 9 Pages 2016
The 2-good-neighbor diagnosability of Cayley graphs generated by transposition trees under the PMC model and MM⁎ model Fulltext Access 9 Pages 2016
Disjoint edges in topological graphs and the tangled-thrackle conjecture Fulltext Access 9 Pages 2016
Repeated-root constacyclic codes of prime power length over Fpm[u]〈ua〉 and their duals Fulltext Access 10 Pages 2016
Isomorphism classes of association schemes induced by Hadamard matrices Fulltext Access 10 Pages 2016
Super-simple (v,4,2)(v,4,2) directed designs and a lower bound for the minimum size of their defining set Fulltext Access 10 Pages 2016
Sweeping words and the length of a generic vector subspace of Mn(F)Mn(F) Fulltext Access 10 Pages 2016
Faster Lyndon factorization algorithms for SLP and LZ78 compressed text Fulltext Access 10 Pages 2016
Constructing two completely independent spanning trees in hypercube-variant networks Fulltext Access 10 Pages 2016
Pure Nash equilibria of competitive diffusion process on toroidal grid graphs Fulltext Access 10 Pages 2016
Efficient implementation of Carathéodory's theorem for the single machine scheduling polytope Fulltext Access 10 Pages 2016
Strongly polynomial primal monotonic build-up simplex algorithm for maximal flow problems Fulltext Access 10 Pages 2016
Distributed multiple-message broadcast in wireless ad hoc networks under the SINR model Fulltext Access 10 Pages 2016
On the number of Steiner triple systems S(2m−1,3,2)S(2m−1,3,2) of rank 2m−m+22m−m+2 over F2F2 Fulltext Access 10 Pages 2016
Factorization of network reliability with perfect nodes II: Connectivity matrix Fulltext Access 10 Pages 2016
Some degree and forbidden subgraph conditions for a graph to have a kk-contractible edge Fulltext Access 10 Pages 2016
Space-efficient algorithm for computing a centerpoint of a set of points in R2 Fulltext Access 10 Pages 2016
Exact algorithms for weighted and unweighted Borda manipulation problems Fulltext Access 11 Pages 2016
Computing the least-core and nucleolus for threshold cardinality matching games Fulltext Access 11 Pages 2016
Vector joint majorization and generalization of Csiszár-Körner's inequality for f-divergence Fulltext Access 11 Pages 2016
An efficient lattice reduction using reuse technique blockwisely on NTRU Fulltext Access 11 Pages 2016
A characterization of b-chromatic and partial Grundy numbers by induced subgraphs Fulltext Access 11 Pages 2016
On MPS construction of blocking sets in projective spaces: A generalization Fulltext Access 11 Pages 2016
Neighbour sum distinguishing total colourings via the Combinatorial Nullstellensatz Fulltext Access 11 Pages 2016
Balanced 2p-variable rotation symmetric Boolean functions with optimal algebraic immunity Fulltext Access 11 Pages 2016
Cayley graphs of diameter two with order greater than 0.684 of the Moore bound for any degree Fulltext Access 12 Pages 2016