Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
[1]
Hilfe
Suche: Author="Rao, T.R.N."
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Efficient mapping of ANNs on hypercube massively parallel machines
Q.M. Malluhi
,
Magdy A. Bayoumi
,
T.R.N. Rao
IEEE Transactions on Computers
44
(6), 1995, pp. 769-779
A class of algebraic geometric codes from curves in high-dimensional projective spaces
G.L. Feng
,
T.R.N. Rao
Lecture Notes in Computer Science
673
, 1993, pp. 132-146
An efficient mapping of multilayer perceptron with backpropagation ANNs on hypercubes
Q.M. Malluhi
,
M.A. Bayoumi
,
T.R.N. Rao
Proceedings of the 5th IEEE Symposium on Parallel and Distributed Processing, SPDP'93 (Dallas, Texas, December 1-4, 1993)
, 1993, pp. 368-375
On the hierarchical hypercube interconnection network
Q.M. Malluhi
,
M.A. Bayoumi
,
T.R.N. Rao
Proceedings of the 7th International Parallel Processing Symposium, IPPS'93 (Newport Beach, California, April 13-16, 1993)
, 1993, pp. 524-530
A construction method for
m
-ary unidirectional error control codes - Application for
m
-ary Berger check to asymmetric error control codes
Tae Nam Ahn
,
Kohichi Sakaniwa
,
T.R.N. Rao
Lecture Notes in Computer Science
508
, 1991, pp. 71-85
Homogenity, pseudo-homogenity, and Gröbner basis computations
Thomas Becker
Lecture Notes in Computer Science
539
, 1991, pp. 65-73
Arithmetic on non supersingular elliptic curves
T. Beth
,
F. Schaefer
Lecture Notes in Computer Science
539
, 1991, pp. 74-81
Implementing some algorithms of Kantor
Greg Butler
Lecture Notes in Computer Science
539
, 1991, pp. 82-93
Computing roadmaps of general semi-algebraic sets
J.F. Canny
Lecture Notes in Computer Science
539
, 1991, pp. 94-107
An improved sign determination algorithm
J.F. Canny
Lecture Notes in Computer Science
539
, 1991, pp. 108-117
Algorithms for the shape of semialgebraic sets - a new approach
Paola Cellini
,
Patrizia Gianni
,
Carlo Traverso
Lecture Notes in Computer Science
539
, 1991, pp. 1-18
The 2-nd generalized Hamming weight of double-error correcting binary BCH codes and their dual codes
Habong Chung
Lecture Notes in Computer Science
539
, 1991, pp. 118-129
Buchberger algorithm and integer programming
Pasqualina Conti
,
Carlo Traverso
Lecture Notes in Computer Science
539
, 1991, pp. 130-139
New systolic architectures for cyclic code encoding
Menouer Diab
Lecture Notes in Computer Science
539
, 1991, pp. 140-151
Algebraic constructions of efficient broadcast networks
Michael J. Dinneen
,
Michael R. Fellows
,
Vance Faber
Lecture Notes in Computer Science
539
, 1991, pp. 152-158
Some constructions in rings of differential polynomials
Giovanni Gallo
,
Bhubaneswar Mishra
,
François Ollivier
Lecture Notes in Computer Science
539
, 1991, pp. 171-182
Concurrent error detection in sequential circuits using convolutional codes
Lawrence P. Holmquist
,
L.L. Kinney
Lecture Notes in Computer Science
539
, 1991, pp. 183-194
On the parameters of algebraic geometric codes
H. Janwa
Lecture Notes in Computer Science
539
, 1991, pp. 19-28
On Wiedemann's method of solving sparse linear systems
Erich Kaltofen
,
B. David Saunders
Lecture Notes in Computer Science
539
, 1991, pp. 29-38
An algorithm for the computation of the radical of an ideal in the ring of polynomials
Teresa Krick
,
Alessandro Logar
Lecture Notes in Computer Science
539
, 1991, pp. 195-205
Integer multiplication in PARSAC:2 on stock microprocessors
Wolfgang Kuechlin
,
David Lutz
,
Nicholas Nevin
Lecture Notes in Computer Science
539
, 1991, pp. 206-217
Polynomial-time construction of spherical codes
Gilles Lachaud
,
Jacques Stern
Lecture Notes in Computer Science
539
, 1991, pp. 218-223
Algorithms for a multiple algebraic extension II
Lars Langemyr
Lecture Notes in Computer Science
539
, 1991, pp. 224-233
On the orphans and covering radius of the Reed-Muller codes
Philippe Langevin
Lecture Notes in Computer Science
539
, 1991, pp. 234-240
A joint authentication and encryption scheme based on algebraic coding theory
Yuanxing Li
,
Xinmei Wang
Lecture Notes in Computer Science
539
, 1991, pp. 241-245
Seiten 1
2
3
>