## Found 675 Documents (Results 1–100)

100
MathJax
Newest 1st

Full Text:

### Construction of good polynomial lattice rules in weighted Walsh spaces by an alternative component-by-component construction. (English)Zbl 07431733

MSC:  65-XX 68-XX
Full Text:

### Complex dynamics from heterogeneous coupling and electromagnetic effect on two neurons: application in images encryption. (English)Zbl 07581470

MSC:  68-XX 94-XX
Full Text:

### On forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computer. (English)Zbl 07542379

Longa, Patrick (ed.) et al., Progress in cryptology – LATINCRYPT 2021. 7th international conference on cryptology and information security in Latin America, Bogotá, Colombia, October 6–8, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12912, 44-63 (2021).
Full Text:

### FAN: a lightweight authenticated cryptographic algorithm. (English)Zbl 07449882

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 299-325 (2021).
MSC:  68P25 94A62 94A60
Full Text:

### Efficient implementation of fast Hough transform using CPCA coprocessor. (English. Russian original)Zbl 1490.65026

Program. Comput. Softw. 47, No. 5, 335-343 (2021); translation from Programmirovanie 47, No. 5, 3-11 (2021).
MSC:  65D18 65Y10
Full Text:

Full Text:

### Computing the rooted triplet distance between phylogenetic networks. (English)Zbl 07357819

MSC:  68Wxx 05Cxx
Full Text:

### Design and smartphone implementation of chaotic duplex H.264-codec video communications. (English)Zbl 07331757

MSC:  68-XX 94A60
Full Text:

### FPGA based effective agriculture productivity prediction system using fuzzy support vector machine. (English)Zbl 07331044

MSC:  68-XX 93-XX
Full Text:

### On the sixth international olympiad in cryptography NSUCRYPTO. (Russian. English summary)Zbl 1492.94114

MSC:  94A60 68P25
Full Text:

### Efficient hardware implementations for elliptic curve cryptography over Curve448. (English)Zbl 07553870

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 228-247 (2020).
Full Text:

### Lightweight authenticated encryption mode suitable for threshold implementation. (English)Zbl 1492.94150

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 705-735 (2020).
MSC:  94A60 68P25 94A62
Full Text:

### The weighted Gaussian curvature derivative of a space-filling diagram. (English)Zbl 07413885

MSC:  82-XX 52A38 92E10
Full Text:

### The weighted mean curvature derivative of a space-filling diagram. (English)Zbl 07413883

MSC:  82-XX 52A38 92E10
Full Text:

Full Text:

### Robust virtual implementation with almost complete information. (English)Zbl 07338105

MSC:  68-XX 93-XX
Full Text:

### The lattice-based digital signature scheme qTESLA. (English)Zbl 07314295

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12146, 441-460 (2020).
MSC:  68M25 94A60
Full Text:

### Saber on ESP32. (English)Zbl 07314294

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12146, 421-440 (2020).
MSC:  68M25 94A60
Full Text:

### Implementing high-performance complex matrix multiplication via the 1M method. (English)Zbl 1452.65087

MSC:  65F99 65Y04 65-04
Full Text:

### On resolving non-determinism in choreographies. (English)Zbl 07269246

MSC:  03B70 68-XX
Full Text:

### Effective algebraic analysis approach to linear systems over Ore algebras. (English)Zbl 1453.93042

Quadrat, Alban (ed.) et al., Algebraic and symbolic computation methods in dynamical systems. Based on articles written for the invited sessions of the 5th symposium on system structure and control, IFAC, Grenoble, France, February 4–6, 2013 and of the 21st international symposium on mathematical theory of networks and systems (MTNS 2014), Groningen, the Netherlands, July 7–11, 2014. Cham: Springer. Adv. Delays Dyn. 9, 3-52 (2020).
MSC:  93B25 93C05
Full Text:

### FACE-LIGHT: fast AES-CTR mode encryption for low-end microcontrollers. (English)Zbl 1446.68064

Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 102-114 (2020).
MSC:  68P25 94A60
Full Text:

### All the HIGHT you need on Cortex-M4. (English)Zbl 1446.68066

Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 70-83 (2020).
MSC:  68P25 94A60
Full Text:

### IPACS: integrated phase-field advanced crack propagation simulator. An adaptive, parallel, physics-based-discretization phase-field framework for fracture propagation in porous media. (English)Zbl 1442.74216

MSC:  74R10 74F10
Full Text:

### Implementation of memory centric scheduling for COTS multi-core real-time systems. (English)Zbl 07559341

Quinton, Sophie (ed.), 31st Euromicro conference on real-time systems, ECRTS 2019, Stuttgart, Germany, July 9–12, 2019. Proceedings. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 133, Article 7, 23 p. (2019).
MSC:  68M20
Full Text:

### The PACE 2018 parameterized algorithms and computational experiments challenge: the third iteration. (English)Zbl 07378612

Paul, Christophe (ed.) et al., 13th international symposium on parameterized and exact computation, IPEC 2018, August 22–24, 2018, Helsinki, Finland. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 115, Article 26, 15 p. (2019).
MSC:  68Q25 68Wxx
Full Text:

### Simple forms and rational solutions of pseudo-linear systems. (English)Zbl 1467.34012

Bradford, Russell (ed.), Proceedings of the 44th international symposium on symbolic and algebraic computation, ISSAC ’19, Beijing, China, July 15–18, 2019. New York, NY: Association for Computing Machinery (ACM). 26-33 (2019).
MSC:  34A30 39A10 68W30
Full Text:

### A new class of Hamiltonian conservative chaotic systems with multistability and design of pseudo-random number generator. (English)Zbl 1481.37057

MSC:  37J25 68M10
Full Text:

### The simplest multi-key linearly homomorphic signature scheme. (English)Zbl 1453.94129

Schwabe, Peter (ed.) et al., Progress in cryptology – LATINCRYPT 2019. 6th international conference on cryptology and information security in Latin America, Santiago de Chile, Chile, October 2–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11774, 280-300 (2019).
MSC:  94A62 68P25
Full Text:

### Method for implementing the arithmetic operation of addition in residue number system based on the use of the principle of circular shift. (English. Russian original)Zbl 1470.65227

Cybern. Syst. Anal. 55, No. 4, 692-698 (2019); translation from Kibern. Sist. Anal. 2019, No. 4, 194-202 (2019).
MSC:  65Y04 94A55
Full Text:

### Practical $$\mathsf{MP} \text{- }\mathsf{LWE}$$-based encryption balancing security-risk versus efficiency. (English)Zbl 1469.94114

MSC:  94A60 68P25 68Q17
Full Text:

### Security analysis model of behavior based on cryptographic protocols implement at source code level. (Chinese. English summary)Zbl 1438.68019

MSC:  68M12 68M25 94A60

Full Text:

### Finite-state techniques. Automata, transducers and bimachines. (English)Zbl 1465.68006

Cambridge Tracts in Theoretical Computer Science 60. Cambridge: Cambridge University Press (ISBN 978-1-108-48541-8/hbk; 978-1-108-75694-5/ebook). x, 304 p. (2019).
Full Text:

### PDE models for atherosclerosis computer implementation in R. (English)Zbl 1409.92124

Synthesis Lectures on Mathematics and Statistics 22. San Rafael, CA: Morgan & Claypool Publishers (ISBN 978-1-68173-445-3; 978-1-68173-443-9; 978-1-68173-444-6/ebook). xii, 129 p. (2019).
Full Text:

### On software implementation of Kuznyechik on Intel CPUs. (English)Zbl 1472.68004

MSC:  68-04 68P25 94A60
Full Text:

Full Text:

### Accelerating integer based fully homomorphic encryption using frequency domain multiplication. (English)Zbl 1458.94241

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 161-176 (2018).
MSC:  94A60 68P25 68M99
Full Text:

### Experimental study of compressed stack algorithms in limited memory environments. (English)Zbl 07286692

D’Angelo, Gianlorenzo (ed.), 17th symposium on experimental algorithms, SEA 2018, June 27–29, 2018, L’Aquila, Italy. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 103, Article 19, 13 p. (2018).
MSC:  68P05 68U05 68W40
Full Text:

### The PACE 2017 parameterized algorithms and computational experiments challenge: the second iteration. (English)Zbl 1443.68220

Lokshtanov, Daniel (ed.) et al., 12th international symposium on parameterized and exact computation, IPEC 2017, Vienna, Austria, September 6–8, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 89, Article 30, 12 p. (2018).
MSC:  68W40 68R10
Full Text:

### Convex-hull algorithms: implementation, testing, and experimentation. (English)Zbl 1461.68242

MSC:  68U05 52B55
Full Text:

Full Text:

Full Text:

### Symbolic manipulation of code properties. (English)Zbl 1396.68067

MSC:  68Q45 68-04 94A45
Full Text:

### Secure number theoretic transform and speed record for Ring-LWE encryption on embedded processors. (English)Zbl 06889987

Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10779, 175-188 (2018).
MSC:  68P25 94A60
Full Text:

### Handbook of floating-point arithmetic. 2nd edition. (English)Zbl 1394.65001

Cham: Birkhäuser (ISBN 978-3-319-76525-9/hbk; 978-3-319-76526-6/ebook). xxv, 627 p. (2018).
Full Text:

### Nemo/Hecke. Computer algebra and number theory packages for the Julia programming language. (English)Zbl 1457.68325

Burr, Michael (ed.), Proceedings of the 42nd international symposium on symbolic and algebraic computation, ISSAC 2017, Kaiserslautern, Germany, July 25–28, 2017. New York, NY: Association for Computing Machinery (ACM). 157-164 (2017).
MSC:  68W30 11-04
Full Text:

### Compositional synthesis of leakage resilient programs. (English)Zbl 1444.68036

Maffei, Matteo (ed.) et al., Principles of security and trust. 6th international conference, POST 2017, held as part of the European joint conferences on theory and practice of software, ETAPS 2017, Uppsala, Sweden, April 22–29, 2017. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 10204, 277-297 (2017).
MSC:  68M25 68N99
Full Text:

### A full RNS variant of FV like somewhat homomorphic encryption schemes. (English)Zbl 1418.94029

Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 423-442 (2017).
MSC:  94A60 68M07
Full Text:

MSC:  65D18
Full Text:

Full Text:

MSC:  68P30
Full Text:

### A FEM approximation of a two-phase obstacle problem and its a posteriori error estimate. (English)Zbl 1369.65143

MSC:  65N30 65N15 65K15
Full Text:

### Approximating multidimensional subset sum and Minkowski decomposition of polygons. (English)Zbl 1409.68330

MSC:  68W25 68U05
Full Text:

### Polyhedral omega: a new algorithm for solving linear Diophantine systems. (English)Zbl 1432.11182

MSC:  11Y50 11D04 05A17
Full Text:

### Compact SD: a new encoding algorithm and its application in multiplication. (English)Zbl 1407.68581

MSC:  68W35 11Y16 65Y04
Full Text:

Full Text:

### Quick and energy-efficient Bayesian computing of binocular disparity using stochastic digital signals. (English)Zbl 1404.68027

MSC:  68M20 62F15 68M07
Full Text:

### A scalable and systolic architectures of Montgomery modular multiplication for public key cryptosystems based on DSPS. (English)Zbl 1448.94217

Carlet, Claude (ed.) et al., Security, privacy, and applied cryptography engineering. 6th international conference, SPACE 2016, Hyderabad, India, December 14–18, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10076, 138-156 (2016).
MSC:  94A60 68M07
Full Text:

### On the implementation of an or-parallel Prolog system for clusters of multicores. (English)Zbl 1379.68081

MSC:  68N17 68M20
Full Text:

Full Text:

### Enhanced digital signature using RNS digit exponent representation. (English)Zbl 1409.94900

Duquesne, Sylvain (ed.) et al., Arithmetic of finite fields. 6th international workshop, WAIFI 2016, Ghent, Belgium, July 13–15, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10064, 177-192 (2016).
MSC:  94A60 68M07
Full Text:

### Generalized low rank models. (English)Zbl 1350.68221

MSC:  68T05 62H25 68-02
Full Text:

### Accelerating homomorphic computations on rational numbers. (English)Zbl 1346.68087

Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 405-423 (2016).
MSC:  68P25 68T05
Full Text:

### Another classroom example of robustness problems in planar convex hull computation. (English)Zbl 1462.65028

Kotsireas, Ilias S. (ed.) et al., Mathematical aspects of computer and information sciences. 6th international conference, MACIS 2015, Berlin, Germany, November 11–13, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9582, 446-450 (2016).
MSC:  65D18 65G50
Full Text:

### Masking large keys in hardware: a masked implementation of McEliece. (English)Zbl 1396.94067

Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 293-309 (2016).
MSC:  94A60 68P25
Full Text:

### Hidden semi-Markov models. Theory, algorithms and applications. (English)Zbl 1330.68005

Amsterdam: Elsevier (ISBN 978-0-12-802767-7/pbk). x, 195 p. (2016).
MSC:  68-01 68T05 68T10
Full Text:

### Iterative method for large linear systems. (English)Zbl 07491470

MSC:  65Y05 68W10 68W25
Full Text:

### End-to-end design of a PUF-based privacy preserving authentication protocol. (English)Zbl 1380.94136

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 556-576 (2015).
MSC:  94A62 68P25
Full Text:

### Single base modular multiplication for efficient hardware RNS implementations of ECC. (English)Zbl 1380.68015

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 123-140 (2015).
MSC:  68M07
Full Text:

### Secure refinements of communication channels. (English)Zbl 1366.68011

Harsha, Prahladh (ed.) et al., 35th IARCS annual conference on foundations of software technology and theoretical computer science, FSTTCS 2015, Bangalore, India, December 16–18, 2015. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-97-2). LIPIcs – Leibniz International Proceedings in Informatics 45, 575-589 (2015).
MSC:  68M14 68M12 68P25
Full Text:

### A parallel method for reliability calculation of diameter constrained networks. (English)Zbl 1374.68080

MSC:  68M15 68R10 68W10
Full Text:

### Multiple shooting in a microsecond. (English)Zbl 1337.65055

Carraro, Thomas (ed.) et al., Multiple shooting and time domain decomposition methods. MuS-TDD, Heidelberg, Germany, May 6–8, 2013. Cham: Springer (ISBN 978-3-319-23320-8/hbk; 978-3-319-23321-5/ebook). Contributions in Mathematical and Computational Sciences 9, 183-201 (2015).
Full Text:

### Parallelized software implementation of elliptic curve scalar multiplication. (English)Zbl 1403.94075

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 445-462 (2015).
Full Text:

Full Text:

### Algorithms for parallelizing a mathematical model of forest fires on supercomputers and theoretical estimates for the efficiency of parallel programs. (English. Russian original)Zbl 1327.68326

Cybern. Syst. Anal. 51, No. 3, 471-480 (2015); translation from Kibern. Sist. Anal. 2015, No. 3, 167-177 (2015).
MSC:  68W10 93A30
Full Text:

### Remote IP protection using timing channels. (English)Zbl 1453.68025

Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, South Korea, December 3–5, 2014. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8949, 222-237 (2015).
MSC:  68M25 68M12 94A60
Full Text:

### Operating system design: the Xinu approach. 2nd ed. (English)Zbl 1314.68001

Boca Raton, FL: CRC Press (ISBN 978-1-4987-1243-9/hbk; 978-0-367-57593-9/pbk; 978-0-429-19074-2/ebook). xxii, 677 p. (2015).
MSC:  68-01 68N25
Full Text:

### Introduction to computer science and economic theory. (English)Zbl 1314.91008

MSC:  91-06 68-06 00B15
Full Text:

Full Text:

### Parallel implementations of LEA. (English)Zbl 1368.94128

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 256-274 (2014).
MSC:  94A60 68P25
Full Text:

### Optimal storage for rainbow tables. (English)Zbl 1368.94085

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 144-157 (2014).
MSC:  94A60 68P25
Full Text:

### Towards practical lattice-based public-key encryption on reconfigurable hardware. (English)Zbl 1321.94085

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 68-85 (2014).
MSC:  94A60 68P25
Full Text:

### Khudra: a new lightweight block cipher for FPGAs. (English)Zbl 1398.68140

Chakraborty, Rajat Subhra (ed.) et al., Security, privacy, and applied cryptography engineering. 4th international conference, SPACE 2014, Pune, India, October 18–22, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12059-1/pbk). Lecture Notes in Computer Science 8804, 126-145 (2014).
MSC:  68P25 94A60
Full Text:

### One word/cycle HC-128 accelerator via state-splitting optimization. (English)Zbl 1337.94041

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 283-303 (2014).
MSC:  94A60 68P25
Full Text:

Full Text:

### A pipelined multi-core MIPS machine. Hardware implementation and correctness proof. (English)Zbl 1304.68005

Lecture Notes in Computer Science 9000. Cham: Springer (ISBN 978-3-319-13905-0/pbk). xii, 352 p. (2014).
Full Text:

### Efficient network-based enforcement of data access rights. (English)Zbl 1423.68137

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8642, 236-254 (2014).
Full Text:

Full Text:

MSC:  65D17
Full Text:

### Rigorously modeling self-stabilizing fault-tolerant circuits: an ultra-robust clocking scheme for systems-on-chip. (English)Zbl 1285.68007

MSC:  68M10 68M14 68W15
Full Text:

### 3D kinetic alpha complexes and their implementation. (English)Zbl 1430.68375

Sanders, Peter (ed.) et al., Proceedings of the 15th workshop on algorithm engineering and experiments (ALENEX ’13), New Orleans, LA, USA, January 7, 2013. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM). 70-77 (2013).
MSC:  68U05 68P05 92C37
Full Text:

Full Text:

### Efficient implementation of bilinear pairings on ARM processors. (English)Zbl 1327.94049

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 149-165 (2013).
MSC:  94A60 14G50 68M07
Full Text:

### On the matrix approach in the complex analysis and its geometric applications. (English)Zbl 1301.30008

Kiryakova, Virginia (ed.), Complex analysis and applications ’13. Proceedings of the international conference, CAA ’13, Sofia, Bulgaria, October 31 – November 2, 2013. Dedicated to the 100th anniversary of Academician Ljubomir Iliev. Sofia: Bulgarian Academy of Sciences, Institute of Mathematics and Informatics (ISBN 978-954-8986-38-0). 100-117 (2013).
Full Text:

MSC:  68U05
Full Text:

MSC:  65D17
Full Text:

### Scientific programming. C-language, algorithms and models in science. (English)Zbl 1283.68001

Hackensack, NJ: World Scientific (ISBN 978-981-4513-40-1/hbk; 978-981-4513-42-5/ebook). xxv, 691 p. (2013).
MSC:  68-01 68N15
Full Text:

all top 5

all top 5

all top 5

all top 3

all top 3