<--- Back to Details
First PageDocument Content
Functions and mappings / Mathematical analysis / Mathematics / Computer arithmetic / Limit of a function / Abstract interpretation / Unit in the last place / Exponentiation / Integral / Lambda calculus / Quantifier / Combinatory logic
Date: 2018-01-15 07:35:42
Functions and mappings
Mathematical analysis
Mathematics
Computer arithmetic
Limit of a function
Abstract interpretation
Unit in the last place
Exponentiation
Integral
Lambda calculus
Quantifier
Combinatory logic

Int. J. of Intelligent Engineering Informatics, Vol. x, No. x, 1–26 Numerical Program Optimization by Automatic Improvement of the Accuracy of Computations Nasrine Damouche* and Matthieu Martel Universit´e de Perpign

Add to Reading List

Source URL: perso.univ-perp.fr

Download Document from Source Website

File Size: 618,50 KB

Share Document on Facebook

Similar Documents

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin  Lev Pachmanov

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1xW2E - View Document

Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

DocID: 1vkME - View Document

Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

DocID: 1vkLm - View Document

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin  Lev Pachmanov

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1tEtV - View Document

EXPONENTIATION WITH ARBITRARY BASES, EXPONENTS MATH 152, SECTION 55 (VIPUL NAIK) Corresponding material in the book: Section 7.5. What students should definitely get: The definition of ab , where a > 0 and b is real. The

EXPONENTIATION WITH ARBITRARY BASES, EXPONENTS MATH 152, SECTION 55 (VIPUL NAIK) Corresponding material in the book: Section 7.5. What students should definitely get: The definition of ab , where a > 0 and b is real. The

DocID: 1sa3i - View Document