Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,378,486 papers from all fields of science
Search
Sign In
Create Free Account
Modulo operation
Known as:
Mod operator
, Modulo function
, Mod
Expand
In computing, the modulo operation finds the remainder after division of one number by another (sometimes called modulus). Given two positive numbers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AC (complexity)
AMPL
Assertion (software development)
BASIC
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Boolector: An Efficient SMT Solver for Bit-Vectors and Arrays
Robert Brummayer
,
Armin Biere
International Conference on Tools and Algorithms…
2009
Corpus ID: 442263
Satisfiability Modulo Theories (SMT) is the problem of deciding satisfiability of a logical formula, expressed in a combination…
Expand
Highly Cited
2005
Highly Cited
2005
Dealing with spatial heterogeneity
G. Marsily
,
F. Delay
,
J. Gonçalves
,
P. Renard
,
V. Teles
,
S. Violette
2005
Corpus ID: 3374796
Heterogeneity can be dealt with by defining homogeneous equivalent properties, known as averaging, or by trying to describe the…
Expand
Highly Cited
2005
Highly Cited
2005
Fast Computation of Large Distributions and Its Cryptographic Applications
A. Maximov
,
T. Johansson
International Conference on the Theory and…
2005
Corpus ID: 15774893
Let X1,X2,..., Xk be independent n bit random variables. If they have arbitrary distributions, we show how to compute…
Expand
Highly Cited
2003
Highly Cited
2003
Peer-to-Peer Systems II
M. Feldman
,
Shelley Zhuang
,
F. Dabek
,
B. Zhao
,
P. Druschel
,
J. Kubiatowicz
Lecture Notes in Computer Science
2003
Corpus ID: 42085720
Structured peer-to-peer overlay networks provide a useful substrate for building distributed applications but there are general…
Expand
Highly Cited
2000
Highly Cited
2000
On the construction of some capacity-approaching coding schemes
Sae-Young Chung
2000
Corpus ID: 22553706
This thesis proposes two constructive methods of approaching the Shannon limit very closely. Interestingly, these two methods…
Expand
Highly Cited
1999
Highly Cited
1999
Efficient VLSI implementation of modulo (2/sup n//spl plusmn/1) addition and multiplication
R. Zimmermann
Proceedings 14th IEEE Symposium on Computer…
1999
Corpus ID: 14419934
New VLSI circuit architectures for addition and multiplication modulo (2/sup n/-1) and (2/sup n/+1) are proposed that allow the…
Expand
Highly Cited
1996
Highly Cited
1996
Metropolitan area video-on-demand service using pyramid broadcasting
S. Viswanathan
,
T. Imielinski
Multimedia Systems
1996
Corpus ID: 13906353
Abstract.Pyramid broadcasting is a new way of giving video-on-demand service on a metropolitan scale. We multiplex the most…
Expand
Highly Cited
1996
Highly Cited
1996
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
D. Boneh
,
R. Venkatesan
Annual International Cryptology Conference
1996
Corpus ID: 18810053
We show that computing the most significant bits of the secret key in a Diffie-Hellman key-exchange protocol from the public keys…
Expand
Highly Cited
1990
Highly Cited
1990
Explicit bounds for primality testing and related problems
E. Bach
1990
Corpus ID: 31714069
Many number-theoretic algorithms rely on a result of Ankeny, which states that if the Extended Riemann Hypothesis (ERH) is true…
Expand
Highly Cited
1990
Highly Cited
1990
An Implementation of an Efficient Algorithm for Bisimulation Equivalence
Jean-Claude Fernandez
Science of Computer Programming
1990
Corpus ID: 2935900
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE