[PDF][PDF] Tilings of additive groups
S den Breeijen, W Bosma, B Terwijn - 2018 - math.ru.nl
… In Chapter 3 we show how to use tilings of binary vector spaces to construct perfect binary
codes. In the last Chapter we list the open problems and possibilities for further research. …
codes. In the last Chapter we list the open problems and possibilities for further research. …
Tile-based joint caching and delivery of 360 videos in heterogeneous networks
P Maniotis, E Bourtsoulatze… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… We introduce the binary variable αnu ∈ {0, 1} … Recall that αnu is a binary variable that
takes value 1 when user u resides in the coverage area of the nth SBS, otherwise its value is 0. …
takes value 1 when user u resides in the coverage area of the nth SBS, otherwise its value is 0. …
Revealing the Ancient Beauty: Digital Reconstruction of Temple Tiles using Computer Vision
A Basu - arXiv preprint arXiv:2507.12195, 2025 - arxiv.org
Modern digitised approaches have dramatically changed the preservation and restoration
of cultural treasures, integrating computer scientists into multidisciplinary projects with ease. …
of cultural treasures, integrating computer scientists into multidisciplinary projects with ease. …
Three, four and five-dimensional fullerenes
M Deza, MI Shtogrin - arXiv preprint math/9906035, 1999 - arxiv.org
We explore some generalizations of fullerenes F_v (simple polyhedra with v vertices and only
5- and 6-gonal faces) seen as (d-1)-dimensional simple manifolds (preferably, spherical or …
5- and 6-gonal faces) seen as (d-1)-dimensional simple manifolds (preferably, spherical or …
Optimal Hash Functions for Approximate Matches on the -Cube
DM Gordon, VS Miller… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
… In [5], the binary Golay code was suggested to find approximate matches in bit-vectors. Data
is provided that suggests it is effective, but it is still not … First, we identify the binary expansion …
is provided that suggests it is effective, but it is still not … First, we identify the binary expansion …
Optimal hash functions for approximate closest pairs on the n-cube
… First we identify the binary expansion x = ∑i<n 2ixn−i with the vector x = (x1,...,xn). Second,
for each optimal right-shifted down-set R2t,n we have listed a minimal set of generators. For …
for each optimal right-shifted down-set R2t,n we have listed a minimal set of generators. For …
Delivery of 360° videos in edge caching assisted wireless cellular networks
P Maniotis - 2020 - repository.essex.ac.uk
… We introduce the binary variable αnu ∈ {0,1} that equals to 1 when user u resides in the
coverage area of the SBS n, and 0 otherwise. Each SBS is equipped with a cache with capacity …
coverage area of the SBS n, and 0 otherwise. Each SBS is equipped with a cache with capacity …
[PDF][PDF] Power Efficient Last Level Cache for Chip Multiprocessors
A Mandke - 2013 - csa.iisc.ac.in
… [96] save frequently accessed instructions in the beginning of a program binary using …
To demonstrate applicability of our proposals to a non-tiles architecture, we also simulate a …
To demonstrate applicability of our proposals to a non-tiles architecture, we also simulate a …
Related searches
- binary non-tiles mathematics
- binary non-tails
- binary nonlinear equations
- binary non-tiles algebra
- binary non-trigonometric functions
- binary non-tiles polynomials
- binary tiles
- binary non-tiles regression
- binary non-tiles optimization
- binary non-tiles algorithm
- binary non-tiles classification
- binary nonlinear systems
- binary non-tiles math