Skip to main content
We continue the study of the family of planar regions dubbed Aztec diamonds in our earlier article and study the ways in which these regions can be tiled by dominoes. Two more proofs of the main formula are given. The first uses the... more
    • by 
    •   6  
      Algebraic CombinatoricsPure MathematicsRepresentation TheoryRepresentation
This paper presents the first results on AIDA/cube, algebraic and sidechannel attacks on variable number of rounds of all members of the KATAN family of block ciphers. Our cube attacks reach 60, 40 and 30 rounds of KATAN32, KATAN48 and... more
    • by 
    •   11  
      SAT Solver DesignCryptanalysisTime ComplexityAlgebraic
Understanding information transfer in the brain is a major challenge in today's neurosciences. Commonly, information transfer between brain areas is analyzed with the help of correlation measures for electrophysiological data. However,... more
    • by 
    •   19  
      Differential AlgebraMagnetoencephalographyModelingElectroencephalography
We point out that the positivity of a Littlewood-Richardson coefficient c γ α,β for sl n can be decided in strongly polynomial time. This means that the number of arithmetic operations is polynomial in n and independent of the bit lengths... more
    • by 
    •   4  
      AlgorithmsAlgebraic CombinatoricsPure MathematicsAlgebraic
An orientably-regular map is a 2-cell embedding of a connected graph or multigraph into an orientable surface, such that the group of all orientation-preserving automorphisms of the embedding has a single orbit on the set of all arcs... more
    • by  and +2
    •   11  
      Applied MathematicsGraph TheoryAlgebraic CombinatoricsPure Mathematics
An algebra A is called a GI-algebra if its group of units A × satisfies a group identity. We provide positive support for the following two open problems.
    • by 
    •   6  
      AlgebraPure MathematicsAlgebraicGroup Identity
Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification... more
    • by 
    •   6  
      TheoryTheoretical Computer ScienceCodingIdentification
In this paper, we study the wreath product of one-class association schemes K n = H (1, n) for n ≥ 2. We show that the d-class association scheme K n 1 K n 2 · · · K n d formed by taking the wreath product of K n i (for n i ≥ 2) has the... more
    • by 
    •   5  
      Algebraic CombinatoricsPure MathematicsAlgebraicDimensional
Several “classical” results on algebraic complete lattices extend to algebraic posets and, more generally, to so called compactly generated posets; but, of course, there may arise difficulties in the absence of certain joins or meets. For... more
    • by 
    •   3  
      Pure MathematicsAlgebraicPoset
We analize the response of a single anharmonic diatomic molecule to a monochromatic time dependent electric field E ω (t) and evaluate the temporal evolution of the dipole moment, phase space trajectories and several transition... more
    • by 
    •   14  
      Quantum ChemistryLinear AlgebraOscillationsAlgebraic
We prove that slices of the unitary spread of Q + (7, q), q ≡ 2 (mod 3), can be partitioned into five disjoint classes. Slices belonging to different classes are non-equivalent under the action of the subgroup of P ΓO + (8, q) fixing the... more
    • by 
    •   3  
      Algebraic CombinatoricsPure MathematicsAlgebraic
We examine graphs that contain a non-trivial link in every embedding into real projective space, using a weaker notion of unlink than was used in . We call such graphs intrinsically linked in RP 3 . We fully characterize such graphs with... more
    • by 
    •   2  
      Pure MathematicsAlgebraic
Let G be a graph of order n such that $\sum_{i=0}^{n}(-1)^{i}a_{i}\lambda^{n-i}$ and $\sum_{i=0}^{n}(-1)^{i}b_{i}\lambda^{n-i}$ are the characteristic polynomials of the signless Laplacian and the Laplacian matrices of G, respectively. We... more
    • by 
    •   5  
      Algebraic CombinatoricsPure MathematicsAlgebraicLaplacian
The notion of metabolic closure is presented and analyzed in terms of Robert Rosen's theory of (M, R) systems. Recent results concerning (M, R) systems are reviewed, specially those defining self-referential equations like f (f)= f.... more
    • by 
    •   2  
      AlgebraicMetabolic pathway
For each integer k ≥ 1, we define an algorithm which associates to a partition whose maximal value is at most k a certain subset of all partitions. In the case when we begin with a partition λ which is square-bounded, i.e. λ = (λ 1 ≥ · ·... more
    • by 
    •   3  
      Algebraic CombinatoricsPure MathematicsAlgebraic
For a permutation ω ∈ S n , Leclerc and Zelevinsky [9] introduced a concept of ω-chamber weakly separated collection of subsets of {1, 2, . . . , n} and conjectured that all inclusion-wise maximal collections of this sort have the same... more
    • by 
    •   5  
      Algebraic CombinatoricsCluster AlgebrasPure MathematicsRepresentation Theory
Passive expressions in Algol-like languages represent computations that read the state but do not modify it. The need for such read-only computations arises in programming logics as well as in concurrent programming. It is also a central... more
    • by 
    •   4  
      Cognitive ScienceComputer ScienceComputer SoftwareAlgebraic
    • by 
    •   3  
      AlgebraicConvexitygeometric
The disturbance rejection, defined as the problem of designing control laws that ensure, where possible, exogenous disturbances that do not affect the output of the perturbed system, has been resolved by means of algebraic and geometric... more
    • by 
    •   6  
      Fuzzy LogicArtificial Neural NetworksOIL AND GAS EXPLORATION AND DRILLINGSliding mode control