Search

Your search keyword '"BIBD"' showing total 169 results

Search Constraints

Start Over You searched for: Descriptor "BIBD" Remove constraint Descriptor: "BIBD"
169 results on '"BIBD"'

Search Results

1. The existence of 23 ${2}^{3}$‐decomposable super‐simple (v,4,6) $(v,4,6)$‐BIBDs.

2. Re-keying analysis in group key management of wireless sensor networks.

3. The existence of λ $\lambda $‐decomposable super‐simple (4,2λ) $(4,2\lambda)$‐GDDs of type gu ${g}^{u}$ with λ=2,4 $\lambda =2,4$.

4. General Jackknife empirical likelihood and its applications.

5. Decomposable super‐simple BIBDs with block size 4 and index 4, 6.

7. DESIGN BASED INCOMPLETE U-STATISTICS.

8. A case study: Comparing testers for means and variances in a balanced incomplete block design.

9. A Rate Scalable Construction of Non-Homogeneous Quantum LDPC Codes of CSS Type Based on Balanced Incomplete Block Design.

10. A new technique for comparing PBIBDs.

11. On improving the construction of balanced incomplete block designs using planar near-rings.

12. ON THE CONSTRUCTION OF BALANCED INCOMPLETE BLOCK DESIGNS THROUGH FACTORIZATION AND COLORING GRAPHS USING MUTUALLY ORTHOGONAL LATIN SQUARE DESIGNS.

13. A NOTE ON INCOMPLETE BLOCK NEIGHBOUR DESIGN AND ITS OPTIMAL CONTRIBUTION.

17. Applications of design theory for the constructions of MDS matrices for lightweight cryptography

18. Optimal binary constant weight codes and affine linear groups over finite fields.

19. AN EMPIRICAL STUDY ON SECOND ORDER ROTATABLE DESIGNS UNDER INTRA CLASS CORRELATED STRUCTURE OF ERRORS USING A PAIR OF BALANCED INCOMPLETE BLOCK DESIGNS.

20. Differences in Tissue and Species Tropism of Reptarenavirus Species Studied by Vesicular Stomatitis Virus Pseudotypes

21. Comparison of Scalable ACC and MC-CDMA for Practical Video Fingerprinting Scheme

22. A NOTE ON SECOND ORDER ROTATABLE DESIGNS UNDER TRIDIAGONAL CORRELATED STRUCTURE OF ERRORS USING BALANCED INCOMPLETE BLOCK DESIGNS.

23. ON MEASURE OF ROTATABILITY FOR SECOND ORDER RESPONSE SURFACE DESIGNS USING SYMMETRICAL UNEQUAL BLOCK ARRANGEMENTS WITH TWO UNEQUAL BLOCK SIZES.

24. A Hierarchical RAID Architecture Towards Fast Recovery and High Reliability.

25. INVESTIGATION OF THE TRACHEAL MUCOCILIARY CLEARANCE IN SNAKES WITH AND WITHOUT BOID INCLUSION BODY DISEASE AND LUNG PATHOLOGY.

26. Some sequences of optimal constant weight codes.

27. Optimal Bipartite Ramanujan Graphs from Balanced Incomplete Block Designs: Their Characterizations and Applications to Expander/LDPC Codes

28. Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting

29. Fingerprinting Codes for Live Pay-Television Broadcast Via Internet

30. Using R in Experimental Design with BIBD: An application in Health Sciences.

31. Efficient block designs for symmetric parallel line assays.

32. Time-Invariant Quasi-Cyclic Spatially Coupled LDPC Codes Based on Packings.

33. Cyclic Polygonal Designs with Block size 3 and Joint Distance 3

34. 42-Decomposable super-simple (v,4,8)-BIBDs.

35. Secure code design against collusion attacks for protecting digital content rights.

36. Chorea as a clinical feature of the basophilic inclusion body disease subtype of fused-in-sarcoma-associated frontotemporal lobar degeneration.

37. Construcción de ciertos diseños combinatorios denominados BIBD

38. Construction of weak universal optimal block designs with various correlation structures and block sizes.

39. Note on the tight relative 2-designs on [formula omitted].

40. A series of single array 2 m factorial search designs for even m.

41. Video Scrambling and Fingerprinting for Digital Right Protection.

42. Pathological features of FTLD-FUS in a Japanese population: Analyses of nine cases.

43. Super-simple balanced incomplete block designs with block size 5 and index 3.

44. Bipartite graphs with five eigenvalues and pseudo designs.

45. Super-Simple Twofold Steiner Pentagon Systems.

46. Small embedding of an into an

47. Group divisible designs with three unequal groups and larger first index

48. A mathematical programming approach to the construction of BIBDs.

49. Existence of directed BIBDs with block size 7 and related perfect 5-deletion-correcting codes of length 7.

50. On Effect of Compromised Nodes on Security of Wireless Sensor Network.

Catalog

Books, media, physical & digital resources