Skip to main content

Showing 1–6 of 6 results for author: Stokes, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2007.10810  [pdf, ps, other

    math.CO cs.DM

    Existence results for pentagonal geometries

    Authors: Anthony D. Forbes, Terry S. Griggs, Klara Stokes

    Abstract: New results on pentagonal geometries PENT(k,r) with block sizes k = 3 or k = 4 are given. In particular we completely determine the existence spectra for PENT(3,r) systems with the maximum number of opposite line pairs as well as those without any opposite line pairs. A wide-ranging result about PENT(3,r) with any number of opposite line pairs is proved. We also determine the existence spectrum of… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

    MSC Class: 05B25; 51E12

  2. arXiv:1610.02022  [pdf, ps, other

    cs.IT

    Geometric decoding of subspace codes with explicit Schubert calculus applied to spread codes

    Authors: Klara Stokes

    Abstract: This article is about a decoding algorithm for error-correcting subspace codes. A version of this algorithm was previously described by Rosenthal, Silberstein and Trautmann. The decoding algorithm requires the code to be defined as the intersection of the Plücker embedding of the Grassmannian and an algebraic variety. We call such codes \emph{geometric subspace codes}. Complexity is substantially… ▽ More

    Submitted 6 October, 2016; originally announced October 2016.

  3. arXiv:1301.5022  [pdf, ps, other

    cs.CR cs.AI cs.IT

    A formalization of re-identification in terms of compatible probabilities

    Authors: Vicenç Torra, Klara Stokes

    Abstract: Re-identification algorithms are used in data privacy to measure disclosure risk. They model the situation in which an adversary attacks a published database by means of linking the information of this adversary with the database. In this paper we formalize this type of algorithm in terms of true probabilities and compatible belief functions. The purpose of this work is to leave aside as re-iden… ▽ More

    Submitted 21 January, 2013; originally announced January 2013.

  4. arXiv:1206.5930  [pdf, ps, other

    cs.CR cs.DB math.CO

    Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search

    Authors: Klara Stokes, Oriol Farràs

    Abstract: Anonymous database search protocols allow users to query a database anonymously. This can be achieved by letting the users form a peer-to-peer community and post queries on behalf of each other. In this article we discuss an application of combinatorial configurations (also known as regular and uniform partial linear spaces) to a protocol for anonymous database search, as defining the key-distribu… ▽ More

    Submitted 7 December, 2012; v1 submitted 26 June, 2012; originally announced June 2012.

  5. arXiv:1112.1978  [pdf, ps, other

    cs.CR math.CO

    Reidentification and k-anonymity: a model for disclosure risk in graphs

    Authors: Klara Stokes, Vicenç Torra

    Abstract: In this article we provide a formal framework for reidentification in general. We define n-confusion as a concept for modelling the anonymity of a database table and we prove that n-confusion is a generalization of k- anonymity. After a short survey on the different available definitions of k- anonymity for graphs we provide a new definition for k-anonymous graph, which we consider to be the corre… ▽ More

    Submitted 12 March, 2012; v1 submitted 8 December, 2011; originally announced December 2011.

  6. arXiv:0907.4230  [pdf, ps, other

    cs.DM

    The Semigroup of Combinatorial Configurations

    Authors: Maria Bras-Amorós, Klara Stokes

    Abstract: A (v,b,r,k) combinatorial configuration is a (r,k)-biregular bipartite graph with v vertices on the left and b vertices on the right and with no cycle of length 4. Combinatorial configurations have become very important for some cryptographic applications to sensor networks and to peer-to-peer communities. Configurable tuples are those tuples (v,b,r,k) for which a (v,b,r,k) combinatorial configura… ▽ More

    Submitted 23 December, 2010; v1 submitted 24 July, 2009; originally announced July 2009.

    Comments: Title changed, article shortened