Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,440,819 papers from all fields of science
Search
Sign In
Create Free Account
Modulo operation
Known as:
Mod operator
, Modulo function
, Mod
Expand
In computing, the modulo operation finds the remainder after division of one number by another (sometimes called modulus). Given two positive numbers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AC (complexity)
AMPL
Assertion (software development)
BASIC
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2006
Highly Cited
2006
Oscillator and Filter Algorithms for Virtual Analog Synthesis
V. Välimäki
,
Antti Huovilainen
Computer Music Journal
2006
Corpus ID: 207618021
19 Virtual analog synthesis refers to computational methods that imitate the sound production principles used in electronic music…
Expand
Highly Cited
2005
Highly Cited
2005
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers
A. Kiayias
,
M. Yung
International Conference on Cryptology in…
2005
Corpus ID: 45717445
The demonstration of an efficient construction proven secure in a formal model that captures all intuitive security properties of…
Expand
Highly Cited
2005
Highly Cited
2005
Certain Exponential Sums and Random Walks on Elliptic Curves
T. Lange
,
I. Shparlinski
Canadian Journal of Mathematics - Journal…
2005
Corpus ID: 120141205
Abstract For a given elliptic curve $\mathbf{E}$ , we obtain an upper bound on the discrepancy of sets of multiples ${{z}_{s}}G…
Expand
Highly Cited
2000
Highly Cited
2000
Critical Motions for Auto-Calibration When Some Intrinsic Parameters Can Vary
Fredrik Kahl
,
B. Triggs
,
Kalle Åström
Journal of Mathematical Imaging and Vision
2000
Corpus ID: 6863769
Auto-calibration is the recovery of the full camera geometry and Euclidean scene structure from several images of an unknown 3D…
Expand
Highly Cited
1994
Highly Cited
1994
Trellis-coded continuous-phase frequency-shift keying with ring convolutional codes
Richard H.-H. Yang
,
Desmond P. Taylor
IEEE Transactions on Information Theory
1994
Corpus ID: 206393460
Trellis-coding techniques are applied to continuous-phase frequency-shift keying (CPFSK). A new coding scheme based on…
Expand
Highly Cited
1993
Highly Cited
1993
High-radix modular multiplication for cryptosystems
Peter Kornerup
Proceedings of IEEE 11th Symposium on Computer…
1993
Corpus ID: 5859414
Two algorithms for modular multiplication with very large moduli are analyzed specifically for their applicability when a high…
Expand
Highly Cited
1990
Highly Cited
1990
Finite projectivity and contravariant finiteness
Kiyoshi Igusa
,
S. Smalø
,
G. Todorov
1990
Corpus ID: 122875920
Let A be an artin algebra, let mod A be the category of finitely generated A-modules, and let pdx mod A be the subcategory of mod…
Expand
Highly Cited
1986
Highly Cited
1986
The extra stage gamma network
Kyungsook Y. Lee
,
W. Hegazy
International Symposium on Computer Architecture
1986
Corpus ID: 903279
The augmented data manipulator (ADM), inverse augmented data manipulator (IADM), and the gamma network are based on the Plus…
Expand
Highly Cited
1970
Highly Cited
1970
Minimization of Exclusive or and Logical Equivalence Switching Circuits
A. Mukhopadhyay
,
Greg Schmitz
IEEE transactions on computers
1970
Corpus ID: 800032
This paper is an attempt to develop minimization algorithms for switching circuits based on Reed-Muller canonic forms. In…
Expand
Highly Cited
1967
Highly Cited
1967
On the Time Required to Perform Multiplication
S. Winograd
JACM
1967
Corpus ID: 5796945
The time required to perform multiplication is investigated. A lower bound on the time required to perform multiplication, as…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE