Sciweavers

66
Voted
DCC
2010
IEEE
15 years 16 days ago
A characterization of the Grassmann embedding of H(q), with q even
In this note, we characterize the Grassmann embedding of H(q), q even, as the unique full embedding of H(q) in PG(12, q) for which each ideal line of H(q) is contained in a plane....
A. De Wispelaere, Joseph A. Thas, Hendrik Van Mald...
74
Voted
DCC
2010
IEEE
15 years 16 days ago
Enumeration of orthogonal Buekenhout unitals
In this paper we develop general techniques for enumerating orthogonal Buekenhout unitals embedded in two-dimensional translation planes. We then apply these techniques in the reg...
R. D. Baker, Gary L. Ebert, Kenneth L. Wantz
76
Voted
DCC
2010
IEEE
15 years 16 days ago
The maximum size of a partial 3-spread in a finite vector space over GF(2)
Let n 3 be an integer, let Vn(2) denote the vector space of dimension n over GF(2), and let c be the least residue of n modulo 3. We prove that the maximum number of 3-dimensional...
Saad El-Zanati, H. Jordon, G. F. Seelinger, Papa S...
85
Voted
DCC
2010
IEEE
15 years 16 days ago
On linear sets on a projective line
Linear sets generalise the concept of subgeometries in a projective space. They have many applications in finite geometry. In this paper we address two problems for linear sets: t...
Michel Lavrauw, Geertrui Van de Voorde
71
Voted
DCC
2010
IEEE
15 years 16 days ago
On hyperovals of polar spaces
We derive lower and upper bounds for the size of a hyperoval of a finite polar space of rank r {2, 3}. We give a computer-free proof for the uniqueness, up to isomorphism, of the...
Bart De Bruyn
83
Voted
DCC
2010
IEEE
15 years 16 days ago
Equidistant frequency permutation arrays and related constant composition codes
This paper introduces and studies the notion of an equidistant frequency permutation array (EFPA). An EFPA of length n = m, distance d and size v is defined to be a v
Sophie Huczynska
119
Voted
DCC
2010
IEEE
15 years 16 days ago
Efficient hybrid encryption from ID-based encryption
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until...
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
DCC
2010
IEEE
15 years 16 days ago
A study of (x(q + 1), x; 2, q)-minihypers
Ivan N. Landjev, Leo Storme
CGF
2008
109views more  CGF 2008»
15 years 16 days ago
A Resolution Independent Approach for the Accurate Rendering of Grooved Surfaces
This paper presents a method for the accurate rendering of path-based surface details such as grooves, scratches and similar features. The method is based on a continuous represen...
Carles Bosch, Xavier Pueyo, Stéphane M&eacu...
82
Voted
CGF
2008
78views more  CGF 2008»
15 years 16 days ago
Tangible Heritage: Production of Astrolabes on a Laser Engraver
The astrolabe, an analog computing device, used to be the iconic instrument of astronomers during the Middle Ages. It allowed a multitude of operations of practical astronomy whic...
G. Zotti