Melissa S. Keranen
Michigan Technological University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Melissa S. Keranen.
Graphs and Combinatorics | 2013
Melissa S. Keranen; Sibel Özkan
A 2-factor in a graph G is a 2-regular spanning subgraph of G, and a 2-factorization of G is a decomposition of all the edges of G into edge-disjoint 2-factors. A
technical symposium on computer science education | 2012
Jun Tao; Jun Ma; Melissa S. Keranen; Jean Mayo; Ching-Kuang Shene
technical symposium on computer science education | 2014
Jun Tao; Jun Ma; Melissa S. Keranen; Jean Mayo; Ching-Kuang Shene; Chaoli Wang
{\{C_{m}^{r}, C_{n}^{s}\}}
Discrete Mathematics | 2015
John Asplund; C. A. Rodger; Melissa S. Keranen
integrating technology into computer science education | 2016
Jun Ma; Jun Tao; Jean Mayo; Ching-Kuang Shene; Melissa S. Keranen; Chaoli Wang
-factorization of Kυ asks for a 2-factorization of Kυ, where r of the 2-factors consists of m-cycles, and s of the 2-factors consists of n-cycles. This is a case of the Hamilton-Waterloo problem with uniform cycle sizes m and n. If υ is even, then it is a decomposition of Kυ − F where a 1-factor F is removed from Kυ. We present necessary and sufficient conditions for the existence of a
technical symposium on computer science education | 2015
Steve Carr; Melissa S. Keranen; Jean Mayo
integrating technology into computer science education | 2015
Can Li; Jun Ma; Jun Tao; Jean Mayo; Ching-Kuang Shene; Melissa S. Keranen; Chaoli Wang
{\{C_{4}^{r}, C_{n}^{1}\}}
Discrete Mathematics | 2014
Charles J. Colbourn; Melissa S. Keranen; Donald L. Kreher
Designs, Codes and Cryptography | 2018
Jezerca Hodaj; Melissa S. Keranen; Donald L. Kreher; Leah Tollefson
-factorization of Kυ − F.
Electronic Journal of Graph Theory and Applications (EJGTA) | 2017
Bryan Freyberg; Melissa S. Keranen
This paper describes a visualization tool ECvisual that helps students understand and instructors teach elliptic curve based ciphers. This tool permits the user to visualize elliptic curves over the real field and over a finite field of prime order, perform arithmetic operations, do encryption and decryption, and convert plaintext to a point on an elliptic curve. The demo mode of ECvisual can be used for classroom presentation and self-study. With the practice mode, the user may go through steps in finite field computations, encryption, decryption and plaintext conversion. The user may compute the output for each operation check each answer for correctness. This helps students understand the primitive operations and how they are used in an elliptic curve cipher. The opportunity for self-study provides an instructor greater flexibility in selecting a lecture pace for this detail-filled material. Classroom evaluation was positive and very encouraging.