default search action
Stephanie Perkins
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j21]Derek H. Smith, Roberto Montemanni, Stephanie Perkins:
The Use of an Exact Algorithm within a Tabu Search Maximum Clique Algorithm. Algorithms 13(10): 253 (2020) - 2019
- [j20]Derek H. Smith, Stephanie Perkins, Roberto Montemanni:
Solving the maximum clique problem with a hybrid algorithm. Int. J. Metaheuristics 7(2): 152-175 (2019) - 2015
- [j19]Francis H. Hunt, Stephanie Perkins, Derek H. Smith:
Decoding mixed errors and erasures in permutation codes. Des. Codes Cryptogr. 74(2): 481-493 (2015) - [j18]Francis H. Hunt, Stephanie Perkins, Derek H. Smith:
Channel models and error correction codes for DNA information storage. Int. J. Inf. Coding Theory 3(2): 120-136 (2015) - 2012
- [j17]Niema Aboluion, Derek H. Smith, Stephanie Perkins:
Linear and nonlinear constructions of DNA codes with Hamming distance 1-s2.0-S0012365X11005280-si18, constant GC-content and a reverse-complement constraint. Discret. Math. 312(5): 1062-1075 (2012) - 2011
- [j16]Sian K. Jones, Stephanie Perkins, Paul A. Roach:
Properties, isomorphisms and enumeration of 2-Quasi-Magic Sudoku grids. Discret. Math. 311(13): 1098-1110 (2011) - [j15]Derek H. Smith, Niema Aboluion, Roberto Montemanni, Stephanie Perkins:
Linear and nonlinear constructions of DNA codes with Hamming distance d and constant GC-content. Discret. Math. 311(13): 1207-1219 (2011) - 2010
- [j14]Keith J. Edwards, Terry S. Griggs, Jan van den Heuvel, Stephanie Perkins, Bridget S. Webb, Vadim E. Zverovich:
Preface. Discret. Math. 310(2): 197-198 (2010) - [j13]Derek H. Smith, Francis H. Hunt, Stephanie Perkins:
Exploiting Spatial Separations in CDMA Systems With Correlation Constrained Sets of Hadamard Matrices. IEEE Trans. Inf. Theory 56(11): 5757-5761 (2010) - [j12]S. O. Sanusi, Derek H. Smith, R. A. Jones, Stephanie Perkins:
The Application of Frequency Assignment Techniques in Spreading Code Assignment. Wirel. Pers. Commun. 54(3): 397-415 (2010) - 2009
- [j11]Derek H. Smith, Richard P. Ward, Stephanie Perkins:
Gold codes, Hadamard partitions and the security of CDMA systems. Des. Codes Cryptogr. 51(3): 231-243 (2009) - [j10]M. B. J. Higgs, Stephanie Perkins, Derek H. Smith:
The Construction of Variable Length Codes With Good Synchronization Properties. IEEE Trans. Inf. Theory 55(4): 1696-1700 (2009) - 2008
- [j9]Derek H. Smith, Stephanie Perkins:
Cyclically permutable representations of cyclic codes. Discret. Appl. Math. 156(1): 76-81 (2008) - 2006
- [j8]Derek H. Smith, Lesley A. Hughes, Stephanie Perkins:
A New Table of Constant Weight Codes of Length Greater than 28. Electron. J. Comb. 13(1) (2006) - [j7]Stephanie Perkins, Alexander L. Sakhnovich, Derek H. Smith:
On an upper bound for mixed error-correcting codes. IEEE Trans. Inf. Theory 52(2): 708-712 (2006) - 2005
- [j6]Stephanie Perkins, Derek H. Smith:
Robust Data Compression: Variable Length Codes and Burst Errors. Comput. J. 48(3): 315-322 (2005) - 2004
- [j5]Stephanie Perkins, Derek H. Smith, Alan Ryley:
Robust Data Compression: Consistency Checking in the Synchronization of Variable Length Codes. Comput. J. 47(3): 309-319 (2004) - 2001
- [j4]Stephanie Perkins, Adrian Escott:
Extended synchronizing codewords for q-ary complete prefix codes. Discret. Math. 231(1-3): 391-401 (2001) - 2000
- [j3]Stephanie Perkins, Derek H. Smith:
A scheme for the synchronization of variable length codes. Discret. Appl. Math. 101(1-3): 231-245 (2000) - 1998
- [j2]Adrian Escott, Stephanie Perkins:
Binary Huffman Equivalent Codes with a Short Synchronizing Codeword. IEEE Trans. Inf. Theory 44(1): 346-351 (1998) - 1997
- [j1]Stephanie Perkins:
Codes with a Disparity Property. Des. Codes Cryptogr. 11(1): 79-97 (1997)
Conference and Workshop Papers
- 2009
- [c2]Paul A. Roach, Sian K. Jones, Stephanie Perkins, Ian J. Grimstead:
A Knowledge-Rich Approach to the Rapid Enumeration of Quasi-Magic Sudoku Search Spaces. ICAART 2009: 246-254 - 2007
- [c1]Sian K. Jones, Paul A. Roach, Stephanie Perkins:
Construction of Heuristics for a Search-Based Approach to Solving Sudoku. SGAI Conf. 2007: 37-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint