Jean-Marie Chauvet

Learn More
Three populations composed of a total of 215 doubled haploid lines and 151 F2 individuals were used to design an intraspecific consensus map of pepper (Capsicum annuum L.). The individual maps varied from 685 to 1668 cM with 16 to 20 linkage groups (LGs). The alignment of the three individual maps permitted the arrangement of 12 consensus major linkage(More)
This research is concerned with the simulation of learning by experience to induce the capability for a knowledge-based system to pre-structure the problem before solving it. The model we present is made of different consecutive modules accounting for the tasks of problem-solving, building a dynamic memory and extracting expectations, and pre-structuring or(More)
This paper presents a fast implementation to compute the scalar multiplication of elliptic curve points based on a General-Purpose computing on Graphics Processing Units (GPGPU) approach. A GPU implementation using Dan Bernstein's Curve25519, an elliptic curve over a 255-bit prime eld complying with the new 128-bit security level, computes the scalar(More)
In the current controversial context caused by the disclosure of classified details of several top-secret United States and British government mass surveillance programs to the press by former NSA contractor Edward Snowden, issues of data privacy, anonymity, unlinkability, forward secrecy and deniability have raised to public prominence. In this work we(More)
Su-Doku, a popular combinatorial puzzle, provides an excellent test-bench for heuristic explorations. Several interesting questions arise from its deceptively simple set of rules. How many distinct Su-Doku grids are there? How to find a solution to a Su-Doku puzzle? Is there a unique solution to a given Su-Doku puzzle? What is a good estimation of a(More)
The subject of this paper, an improbable implementation of a recently standardized cryptographic hash function on a thirty-five-year-old microcomputer, may strike some as unusual and recreative at best. In the tedious discipline of the process, however, lessons were learned in implementation trade-offs for basic cryptographic primitives which may prove(More)
As object-oriented approaches to software engineering are gaining wider acceptance, the body of software components available as reusable objects is expected to grow accordingly. The emerging object oriented database technology promises to provide appropriate access paths to such, possibly large and semantically rich, software bases [5]. The software(More)
robot scheduling with time-window constraints using a critical path approach. The cutting stock problem with mixed objectives: Two heuristics based on dynamic programming. A comparative study of exact algorithms for the two dimensional strip packing problem. An improved heuristic and an exact algorithm for the 2D strip and bin packing problem. application(More)