Sciweavers

2397 search results - page 77 / 480
» Applications of integer relation algorithms
Sort
View
IIS
2004
15 years 1 months ago
Application of evolutionary computing to conformational analysis
In this paper we report new results concerning use of genetic algorithms in conformational analysis, field of pharmacy related to discovery and design of new drugs. The goal is to ...
Aleksander Wawer, Franciszek Seredynski, Pascal Bo...
GLVLSI
2011
IEEE
351views VLSI» more  GLVLSI 2011»
14 years 3 months ago
Design of low-power multiple constant multiplications using low-complexity minimum depth operations
Existing optimization algorithms for the multiplierless realization of multiple constant multiplications (MCM) typically target the minimization of the number of addition and subt...
Levent Aksoy, Eduardo Costa, Paulo F. Flores, Jos&...
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
15 years 6 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza
ISCAS
2005
IEEE
147views Hardware» more  ISCAS 2005»
15 years 5 months ago
A heuristic approach for multiple restricted multiplication
— This paper introduces a heuristic solution to the multiple restricted multiplication (MRM) optimization problem. MRM refers to a situation where a single variable is multiplied...
Nalin Sidahao, George A. Constantinides, Peter Y. ...
TIT
2002
126views more  TIT 2002»
14 years 11 months ago
Two-dimensional interleaving schemes with repetitions: Constructions and bounds
Abstract--Two-dimensional interleaving schemes with repetitions are considered. These schemes are required for the correction of two-dimensional bursts (or clusters) of errors in a...
Tuvi Etzion, Alexander Vardy