The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
2005, volume: 34, number: 2-3

  1. Aart Blokhuis, Willem H. Haemers
    Preface. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:135-135 [Journal]
  2. Edwin R. van Dam
    The Combinatorics of Dom de Caen. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:137-148 [Journal]
  3. Dominique de Caen, Dmitry Fon-Der-Flaass
    Distance Regular Covers of Complete Graphs from Latin Squares. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:149-153 [Journal]
  4. Kris Coolsaet, Jan Degraer
    A Computer-Assisted Proof of the Uniqueness of the Perkel Graph. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:155-171 [Journal]
  5. Bang Sejeong, Jack H. Koolen
    Some Interlacing Results for the Eigenvalues of Distance-regular graphs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:173-186 [Journal]
  6. Mitsugu Hirasaka
    On Meta-Thin Association Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:187-201 [Journal]
  7. Ron Shaw, Johannes G. Maks, Neil A. Gordon
    The Classification of Flats in PG(9, 2) which are External to the Grassmannian G1, 4, 2. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:203-227 [Journal]
  8. Dragos Cvetkovic, Peter Rowlinson, Slobodan K. Simic
    Graphs With Least Eigenvalue -2: A New Proof of the 31 Forbidden Subgraphs Theorem. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:229-240 [Journal]
  9. Brian Curtin
    Algebraic Characterizations of Graph Regularity Conditions. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:241-248 [Journal]
  10. Mikhail E. Muzychuk, István Kovács
    A Solution of a Problem of A. E. Brouwer. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:249-264 [Journal]
  11. Ákos Seress
    Square-Free Non-Cayley Numbers. On Vertex-Transitive Non-Cayley Graphs of Square-Free Order. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:265-281 [Journal]
  12. Joseph A. Thas, Hendrik Van Maldeghem
    Some Characterizations of Finite Hermitian Veroneseans. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:283-293 [Journal]
  13. R. D. Baker, Gary L. Ebert, Tim Penttila
    Hyperbolic Fibrations and q-Clans. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:295-305 [Journal]
  14. Paul Terwilliger
    Two Linear Transformations each Tridiagonal with Respect to an Eigenbasis of the other; Comments on the Parameter Array. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:307-332 [Journal]
  15. Hans Cuypers
    A Note on the Tight Spherical 7-Design in R23 and 5-Design in R7*. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:333-337 [Journal]
  16. Klaus Metsch
    Blocking Structures of Hermitian Varieties. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:34, n:2-3, pp:339-360 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002