Author of the publication

Cryptography and Security in Computing

, , , and . chapter 4: Construction of Orthogonal Arrays of Index Unity Using Logarithm Tables for Galois Fields, page 71-90. INTECH, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An effective two-stage simulated annealing algorithm for the minimum linear arrangement problem., , and . Comput. Oper. Res., 35 (10): 3331-3346 (2008)A Simulated Annealing with Variable Neighborhood Search Approach to Construct Mixed Covering Arrays., and . Electron. Notes Discret. Math., (2012)Improved pairwise test suites for non-prime-power orders., , and . IET Softw., 12 (3): 215-224 (2018)A Genetic Algorithms for Matrix Bandwith Reduction., , and . GECCO, page 388. Morgan Kaufmann, (2000)Covering arrays of strength three from extended permutation vectors., and . Des. Codes Cryptogr., 86 (11): 2629-2643 (2018)SAT Model for the Curriculum-Based Course Timetabling Problem., , , and . Res. Comput. Sci., (2013)Improved covering arrays using covering perfect hash families with groups of restricted entries., and . Appl. Math. Comput., (2020)A Data Warehouse for Weather Information: A Pattern Recognition Solution for Climatic Conditions in México., and . ICEIS (1), page 562-565. (2004)Verificación de Covering Arrays: Aplicando la Supercomputación y la Computación Grid, , and . LAP Lambert Academic Publishing, (2010)Optimization of Investment Options Using SQL, , , and . Advances in Artificial Intelligence – IBERAMIA 2010, volume 6433 of Lecture Notes in Computer Science, page 30-39. Berlin / Heidelberg, Springer, (2010)