Hamming graph

Results: 9



#Item
1RANDOM SUBGRAPHS OF THE 2D HAMMING GRAPH: THE SUPERCRITICAL PHASE REMCO VAN DER HOFSTAD AND MALWINA J. LUCZAK CDAM Research report LSE-CDAMAbstract. We study random subgraphs of the 2-dimensional Hamming graph H

RANDOM SUBGRAPHS OF THE 2D HAMMING GRAPH: THE SUPERCRITICAL PHASE REMCO VAN DER HOFSTAD AND MALWINA J. LUCZAK CDAM Research report LSE-CDAMAbstract. We study random subgraphs of the 2-dimensional Hamming graph H

Add to Reading List

Source URL: www.cdam.lse.ac.uk

Language: English - Date: 2017-04-12 10:30:42
    2CDAM research report LSE-CDAMRANDOM SUBGRAPHS OF THE 2D HAMMING GRAPH: THE SUPERCRITICAL PHASE REMCO VAN DER HOFSTAD AND MALWINA J. LUCZAK Abstract. We study random subgraphs of the 2-dimensional Hamming graph H

    CDAM research report LSE-CDAMRANDOM SUBGRAPHS OF THE 2D HAMMING GRAPH: THE SUPERCRITICAL PHASE REMCO VAN DER HOFSTAD AND MALWINA J. LUCZAK Abstract. We study random subgraphs of the 2-dimensional Hamming graph H

    Add to Reading List

    Source URL: www.cdam.lse.ac.uk

    Language: English - Date: 2017-04-12 10:30:33
      3CDAM research report LSE-CDAMTHE SECOND LARGEST COMPONENT IN THE SUPERCRITICAL 2D HAMMING GRAPH MALWINA J. LUCZAK AND JOEL SPENCER Abstract. The 2-dimensional Hamming graph H(2, n) consists of the n2 vertices (i

      CDAM research report LSE-CDAMTHE SECOND LARGEST COMPONENT IN THE SUPERCRITICAL 2D HAMMING GRAPH MALWINA J. LUCZAK AND JOEL SPENCER Abstract. The 2-dimensional Hamming graph H(2, n) consists of the n2 vertices (i

      Add to Reading List

      Source URL: www.cdam.lse.ac.uk

      Language: English - Date: 2017-04-12 10:30:41
        4CS168: The Modern Algorithmic Toolbox Lecture #19: Expander Codes Tim Roughgarden & Gregory Valiant∗ June 1, 2016 In the first lecture of CS168, we talked about modern techniques in data storage (consistent hashing). S

        CS168: The Modern Algorithmic Toolbox Lecture #19: Expander Codes Tim Roughgarden & Gregory Valiant∗ June 1, 2016 In the first lecture of CS168, we talked about modern techniques in data storage (consistent hashing). S

        Add to Reading List

        Source URL: theory.stanford.edu

        Language: English - Date: 2016-06-04 09:49:43
        5Spectral Graph Theory  Lecture 11 Introduction to Coding Theory Daniel A. Spielman

        Spectral Graph Theory Lecture 11 Introduction to Coding Theory Daniel A. Spielman

        Add to Reading List

        Source URL: www.cs.yale.edu

        Language: English - Date: 2012-08-24 09:50:05
        61  Grid Colorings in Steganography Jessica Fridrich and Petr Lisonˇek  Abstract— A proper vertex coloring of a graph is called

        1 Grid Colorings in Steganography Jessica Fridrich and Petr Lisonˇek Abstract— A proper vertex coloring of a graph is called

        Add to Reading List

        Source URL: www.ws.binghamton.edu

        Language: English - Date: 2006-12-11 09:55:35
        7Public Lecture, IPM-Isfahan  Professor Edwin van Dam Tilburg University, The Netherlands  Titel:

        Public Lecture, IPM-Isfahan Professor Edwin van Dam Tilburg University, The Netherlands Titel:

        Add to Reading List

        Source URL: math.ipm.ac.ir

        Language: English - Date: 2015-04-26 07:32:42
        8ITW 2007, Lake Tahoe, California, September 2 - 6, 2007  Nonlinear Sparse-Graph Codes for Lossy Compression of Discrete Nonredundant Sources Ankit Gupta

        ITW 2007, Lake Tahoe, California, September 2 - 6, 2007 Nonlinear Sparse-Graph Codes for Lossy Compression of Discrete Nonredundant Sources Ankit Gupta

        Add to Reading List

        Source URL: www.princeton.edu

        Language: English - Date: 2008-11-03 19:55:31
        9590  J. Chem. In$ Comput. Sci. 1995, 35, [removed]

        590 J. Chem. In$ Comput. Sci. 1995, 35, [removed]

        Add to Reading List

        Source URL: www.fmf.uni-lj.si

        Language: English - Date: 2010-10-07 09:31:00