Results 241 to 250 of about 10,250 (292)
Some of the next articles are maybe not open access.
Sheaf representation and Chinese remainder theorems
Algebra Universalis, 1992\textit{D. M. Clark} and \textit{P. H. Krauss} [``Global subdirect products'', Mem. Am. Math. Soc. 210 (1979; Zbl 0421.08001)] define an algebra to be globally (Boolean) representable by a class of algebras \({\mathcal M}\) if it is isomorphic to the algebra of the global sections of a subdirect sheaf whose index space is compact and \(T_ 0\) and whose
openaire +2 more sources
Optimal estimates of common remainder for the robust Chinese Remainder Theorem
Communications in Nonlinear Science and Numerical Simulation, 2014zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Xiaoping +4 more
openaire +1 more source
Robustness in Chinese Remainder Theorem for Multiple Numbers and Remainder Coding
IEEE Transactions on Signal Processing, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hanshen Xiao +3 more
openaire +1 more source
Generalization of the Chinese remainder theorem
Vestnik St. Petersburg University: Mathematics, 2007Let \(B\) denote an \(m \times (m+1)\) \textit{basis} matrix with integer entries, and let \(r\) denote a column vector with \(m\) integer components. This paper presents sufficient conditions for vector solutions \(x\) with integer components of the linear system \(Bx = r\) in the cases that \(B\) is \textit{marginal} as well as \textit{saturated.} In
Davydova, I. M., Fedoseeva, E. Ya.
openaire +1 more source
Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem
IET Information Security, 2019In this study, the authors propose a new protocol to share secret shadows for verifiable ( t , n ) secret sharing (VSS) schemes. Unlike traditional VSS schemes, whose communications between the dealer and the participants require a secure channel, the ...
Maryam Sheikhi-Garjan +2 more
semanticscholar +1 more source
A Generalized Chinese Remainder Theorem
The College Mathematics Journal, 2002(2002). A Generalized Chinese Remainder Theorem. The College Mathematics Journal: Vol. 33, No. 4, pp. 279-282.
openaire +1 more source
1979
The Chinese remainder theorem is so named because it was known to the ancient Chinese. In its original form, it is good for solving problems, as we’ll see in the exercises. But suitably reinterpreted, it is a powerful tool for helping us understand how numbers relate in different moduli.
openaire +1 more source
The Chinese remainder theorem is so named because it was known to the ancient Chinese. In its original form, it is good for solving problems, as we’ll see in the exercises. But suitably reinterpreted, it is a powerful tool for helping us understand how numbers relate in different moduli.
openaire +1 more source
The General Chinese Remainder Theorem
The American Mathematical Monthly, 1952(1952). The General Chinese Remainder Theorem. The American Mathematical Monthly: Vol. 59, No. 6, pp. 365-370.
openaire +1 more source
Group Authorization Using Chinese Remainder Theorem
2020The paper presents a new way of group authorization for a population of users of a given IT system. Group authorization is highly desirable in applications where the submission of individual rights is not sufficient: service support (service-owner relationship), anonymous verification of belonging to a particular group (e.g., disabled persons, city ...
Tomasz Krokosz, Jarogniew Rykowski
openaire +1 more source

