Permutation matrix

Results: 58



#Item
21On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes Mridul Nandi Indian Statistical Institute

On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes Mridul Nandi Indian Statistical Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 03:14:54
22Research announcement from 1978: AN INVARIANCE OF SYMMETRY BY STEVEN H. CULLINANE We present a simple, surprising, and beautiful combinatorial invariance of geometric symmetry, in an algebraic setting. DEFINITION. A delt

Research announcement from 1978: AN INVARIANCE OF SYMMETRY BY STEVEN H. CULLINANE We present a simple, surprising, and beautiful combinatorial invariance of geometric symmetry, in an algebraic setting. DEFINITION. A delt

Add to Reading List

Source URL: finitegeometry.org

Language: English - Date: 2006-05-20 23:29:07
23A combinatorial problem motivated by a data transmission application Torleiv Kløve, Institutt for informatikk, Univ. of Bergen Abstract A permutation array of length n is a set of permutations of n elements such that an

A combinatorial problem motivated by a data transmission application Torleiv Kløve, Institutt for informatikk, Univ. of Bergen Abstract A permutation array of length n is a set of permutations of n elements such that an

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-03-09 04:39:31
24Methods of Moments for Learning Stochastic Languages: Unified Presentation and Empirical Comparison Borja Balle1 BBALLE @ CS . MCGILL . CA William L Hamilton1

Methods of Moments for Learning Stochastic Languages: Unified Presentation and Empirical Comparison Borja Balle1 BBALLE @ CS . MCGILL . CA William L Hamilton1

Add to Reading List

Source URL: jmlr.org

Language: English - Date: 2015-02-01 17:03:25
25

PDF Document

Add to Reading List

Source URL: www.unizar.es

Language: English - Date: 2001-09-28 05:57:12
26Adversarial Leakage in Games Noga Alon∗ Yuval Emek†  Michal Feldman‡

Adversarial Leakage in Games Noga Alon∗ Yuval Emek† Michal Feldman‡

Add to Reading List

Source URL: www.math.tau.ac.il

Language: English - Date: 2009-11-04 12:59:05
27AUSTRALASIAN JOURNAL OF COMBINATORICS Volume[removed]), Pages 214–248 Constructions for Hadamard matrices using Clifford algebras, and their relation to amicability / anti-amicability graphs

AUSTRALASIAN JOURNAL OF COMBINATORICS Volume[removed]), Pages 214–248 Constructions for Hadamard matrices using Clifford algebras, and their relation to amicability / anti-amicability graphs

Add to Reading List

Source URL: ajc.maths.uq.edu.au

Language: English - Date: 2014-01-07 18:55:41
28Introduction Distance Summary BAO data analysis Ue-Li Pen

Introduction Distance Summary BAO data analysis Ue-Li Pen

Add to Reading List

Source URL: chime.phas.ubc.ca

Language: English - Date: 2013-01-15 13:28:48
29PIMS Distinguished Lecture Series  Richard Anstee University of British Columbia Thursday

PIMS Distinguished Lecture Series Richard Anstee University of British Columbia Thursday

Add to Reading List

Source URL: www.uregina.ca

Language: English - Date: 2014-03-12 16:17:20
30Electronic Journal of Statistics Vol[removed]–515 ISSN: [removed]DOI: [removed]EJS176  Sparse permutation invariant covariance

Electronic Journal of Statistics Vol[removed]–515 ISSN: [removed]DOI: [removed]EJS176 Sparse permutation invariant covariance

Add to Reading List

Source URL: www.stat.berkeley.edu

Language: English - Date: 2009-03-21 03:15:55