Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Parallel algorithms --- Parallel processing (Electronic computers) --- 681.3*C12 --- 681.3*D13 --- 681.3*G1 --- Algorithms --- High performance computing --- Multiprocessors --- Parallel programming (Computer science) --- Supercomputers --- Multiple data stream architectures (multiprocessors): MIMD; SIMD; pipeline and parallel processors; array-, vector-, associative processors; interconnection architectures: common bus, multiport memory, crossbar switch --- Concurrent programming --- Numerical analysis --- Parallel algorithms. --- Parallel processing (Electronic computers). --- 681.3*G1 Numerical analysis --- 681.3*D13 Concurrent programming --- 681.3*C12 Multiple data stream architectures (multiprocessors): MIMD; SIMD; pipeline and parallel processors; array-, vector-, associative processors; interconnection architectures: common bus, multiport memory, crossbar switch
Choose an application
Transputers --- Parallel programming (Computer science) --- 681.3*G --- 681.3*G1 --- 681.3*C12 --- 681.3*F12 --- Mathematics of computing --- Numerical analysis --- Multiple data stream architectures (multiprocessors): MIMD; SIMD; pipeline and parallel processors; array-, vector-, associative processors; interconnection architectures: common bus, multiport memory, crossbar switch --- Modes of computation: alternation and nondeterminism; parallelism; probabilistic computation; relations among modes; relativized computation --- 681.3*F12 Modes of computation: alternation and nondeterminism; parallelism; probabilistic computation; relations among modes; relativized computation --- 681.3*C12 Multiple data stream architectures (multiprocessors): MIMD; SIMD; pipeline and parallel processors; array-, vector-, associative processors; interconnection architectures: common bus, multiport memory, crossbar switch --- 681.3*G1 Numerical analysis --- 681.3*G Mathematics of computing --- Parallel programming (Computer science) - Congresses. --- Transputers - Congresses.
Choose an application
The most comprehensive treatment of FFTs to date. Van Loan captures the interplay between mathematics and the design of effective numerical algorithms--a critical connection as more advanced machines become available. A stylized Matlab notation, which is familiar to those engaged in high-performance computing, is used. The Fast Fourier Transform (FFT) family of algorithms has revolutionized many areas of scientific computation. The FFT is one of the most widely used algorithms in science and engineering, with applications in almost every discipline. This volume is essential for professionals interested in linear algebra as well as those working with numerical methods. The FFT is also a great vehicle for teaching key aspects of scientific computing.
Numerical analysis --- Fourier transformations --- Transformations de Fourier --- #TELE:SISTA --- #TELE:MI2 --- 517.518.8 --- 519.6 --- 681.3*F21 --- 681.3*G4 --- Transformations, Fourier --- Transforms, Fourier --- Fourier analysis --- Transformations (Mathematics) --- Approximation of functions by polynomials and their generalizations --- Computational mathematics. Numerical analysis. Computer programming --- Numerical algorithms and problems: computation of transforms; computations infinite fields; computations on matrices; computations on polynomials; numer-theoretic computations--See also {681.3*G1}; {681.3*G4}; {681.3*I1} --- Mathematical software: algorithm analysis; certification and testing; efficiency; portability; reliability and robustness; verification --- Fourier transformations. --- 681.3*G4 Mathematical software: algorithm analysis; certification and testing; efficiency; portability; reliability and robustness; verification --- 681.3*F21 Numerical algorithms and problems: computation of transforms; computations infinite fields; computations on matrices; computations on polynomials; numer-theoretic computations--See also {681.3*G1}; {681.3*G4}; {681.3*I1} --- 519.6 Computational mathematics. Numerical analysis. Computer programming --- 517.518.8 Approximation of functions by polynomials and their generalizations --- Analyse numérique. --- Analyse numérique --- Numerical analysis. --- Analyse de fourier --- Fast fourier transform = fft
Choose an application
This report on the state of the art and future directions of public-key cryptography is published in accordance with the terms of reference of the European Institute for System Security (EISS). The EISS was founded in 1988 by cabinet resolution of the state government of Baden-W}rttemberg and its basic task is scientific research and knowledge transfer in the field of security in telecommunications and computer and information systems. This report gives the results of an EISS workshop on public-keycryptography and contains seven chapters: an introduction, the scope of the workshop, the topics chosen, classification and description of the most prominent public-key systems, the dependence of public-key cryptography on computational number theory, mistakes and problems with public-key systems, and a projection of needs and requirements for public-key systems. It is addressed to all members of the computer science community: systems developers, researchers, decision makers, standardization committees, patent offices, and users and customers of secure computer systems.
Chiffrement --- Codes secrets --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Écriture cryptographique --- Écriture secrète --- Computers --- Access control --- -Public key cryptography --- 681.3*E3 --- 681.3*F21 --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encryption: data encryption standard; DES; public key cryptosystems --- Numerical algorithms and problems: computation of transforms; computations infinite fields; computations on matrices; computations on polynomials; numer-theoretic computations--See also {681.3*G1}; {681.3*G4}; {681.3*I1} --- 681.3*F21 Numerical algorithms and problems: computation of transforms; computations infinite fields; computations on matrices; computations on polynomials; numer-theoretic computations--See also {681.3*G1}; {681.3*G4}; {681.3*I1} --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cryptography. --- Public key cryptography --- Computer security --- Computers - Access control. --- Data encryption (Computer science). --- Computer software. --- Cryptology. --- Algorithm Analysis and Problem Complexity. --- Software, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science)
Listing 1 - 4 of 4 |
Sort by
|