Skip to main content

previous disabled Page of 819
and
  1. No Access

    Article

    Some modifications of the parallel Halley iteration method and their convergence

    In this paper we derive five kinds of algorithms for simultaneously finding the zeros of a complex polynomial. The convergence and the convergence rate with higher order are obtained. The algorithms are numeri...

    Prof. De-ren Wang, Yu-jiang Wu in Computing (1987)

  2. No Access

    Article

    Complexity analysis of a process for simultaneously obtaining all zeros of polynomials

    In this paper, applying the major function method, we extend the convergence region of algorithm (2) and obtain a large computable radius estimate of safe initial disks. This result is an improvement of all re...

    Wang Deren, Zhao Fengguang in Computing (1989)

  3. No Access

    Article

    Effective error estimates for the numerical solution of Fredholm integral equations

    This paper describes the theoretical basis of an effective a posteriori error analysis for Fredholm integral equations of the second kind. We present error bounds from which we then derive error estimators tha...

    Ch. Kenney, P. Linz, R. L. C. Wang in Computing (1989)

  4. No Access

    Chapter and Conference Paper

    MPS-an experimental multi-microprocessor based parallel system

    This paper introduces an experimental tightly-coupled multi-microprocessor system (MPS) for parallel processing. An overview of hardware architecture is given and a simple example of algorithm run on MPS is us...

    Gu Qing Zuo, An Zhong Wang in CONPAR 90 — VAPP IV (1990)

  5. No Access

    Chapter and Conference Paper

    Specifying Processes in Terms of Their Environments

    A simple approach to specification and verification of processes is suggested. Instead of process equivalence as usual in process algebra, the correctness of an implementation w.r.t a specification is determined ...

    Wang Yi in Specification and Verification of Concurrent Systems (1990)

  6. Chapter and Conference Paper

    Linear Complexity Profiles and Continued Fractions

    The linear complexity, \( \mathcal{L} \) (sn), of a sequence sn is defined as the length of the shortest linear feedba...

    Muzhong Wang in Advances in Cryptology — EUROCRYPT ’89 (1990)

  7. No Access

    Chapter and Conference Paper

    Prelude: A system for portable parallel software

    William Weihl, Eric Brewer, Adrian Colbrook in PARLE '92 Parallel Architectures and Langu… (1992)

  8. No Access

    Chapter and Conference Paper

    Choice coordination with multiple alternatives (preliminary version)

    The Choice Coordination Problem with k alternatives (k-CCP) was introduced by Rabin in 1982 [Rab82]. The goal is to design a wait-free protocol for n asynchronous processes which causes all correct processes to a...

    David S. Greenberg, Gadi Taubenfeld, Da-Wei Wang in Distributed Algorithms (1992)

  9. Chapter and Conference Paper

    The development and testing of the identity-based conference key distribution system for the RHODOS distributed system

    In this paper, we demonstrate that it is possible to develop an authentication service as an integral part of a distributed operating system, subject to some requirements and extensions to the original Koyama-...

    Michael Wang, Andrzej Goscinski in Computer Security — ESORICS 92 (1992)

  10. No Access

    Article

    Generating NURBS curves by envelopes

    Nonuniform rational B-spline curves may be recursively generated by the envelope of a family of low order rational B-spline curves, and this envelope is unique. Thus rational B-spline curves can be directly de...

    G. J. Wang in Computing (1992)

  11. No Access

    Chapter and Conference Paper

    Optimal map**s of m dimensional FFT communication to k dimensional mesh for arbitrary m and k

    The FFT communication patterns are important to not only FFT algorithms, but also many other algorithms over one or higher dimensional. The map** of m dimensional FFT communication to k dimensional mesh has pre...

    Z. George Mou, **ao**g Wang in PARLE '93 Parallel Architectures and Languages Europe (1993)

  12. No Access

    Chapter and Conference Paper

    A unified framework for multicast forwarding

    This paper examines the issues of implementation and integration in multicast. A framework for multicast forwarding is presented, which separates multicast forwarding from any associated protocols that may aff...

    Zheng Wang, Jon Crowcroft in Network and Operating System Support for D… (1994)

  13. No Access

    Article

    Vector-quantization-based video codec for software-only playback on personal computers

    This paper discusses a video compression and decompression method based on vector quantization (VQ) for use on general purpose computer systems without specialized hardware. After describing basic VQ coding, w...

    Katherine S. Wang, James O. Normile, Hsi -Jung Wu in Multimedia Systems (1994)

  14. Chapter and Conference Paper

    On the Matsumoto and Imai’s Human Identification Scheme

    At Eurocrypt'91, Matsumoto and Imai presented a human identification scheme for insecure channels, which is suitable for human ability of memorizing and processing a short secret. It prevents an in- truder fro...

    Chih-Hung Wang, Tzonelih Hwang, Jiun-Jang Tsai in Advances in Cryptology — EUROCRYPT ’95 (1995)

  15. Chapter

    D-BMAP Models for Performance Evaluation of ATM Networks

    The fixed cell size used in ATM networks naturally leads to the use of discrete-time models for performance evaluation. In this paper, we describe our work on estimating network performance based on Discrete-time...

    John A. Silvester, Nelson L. S. Fonseca in Performance Modelling and Evaluation of AT… (1995)

  16. No Access

    Article

    Curve interpolation with constrained length

    We consider the problem of finding a curve which interpolates at given points such that (approximately) the length of the curve between each two subsequent interpolation points is equal to some given number. W...

    K. van Damme, R. -H. Wang in Computing (1995)

  17. Chapter and Conference Paper

    Uppaal in 1995

    Uppaal is a tool suite for automatic verification of safety and bounded liveness properties of real-time systems modeled as networks of timed automata [12, 9, 4], developed during the past two year...

    Johan Bengtsson, Kim G. Larsen in Tools and Algorithms for the Construction … (1996)

  18. No Access

    Chapter and Conference Paper

    The secure conferencing user agent A tool to provide secure conferencing with Mbone multimedia conferencing applications

    This report briefly describes the Secure Conferencing User Agent (SCUA), which provides secure conferencing with privacy and authentication. The SCUA was implemented using the MICE multimedia conferencing appl...

    Elfriede Hinsch, Anne Jaegemann in Interactive Distributed Multimedia Systems… (1996)

  19. No Access

    Chapter and Conference Paper

    A group-oriented (t, n) undeniable signature scheme without trusted center

    We shall propose a new group-oriented undeniable signature scheme without the assistance of any trusted center in this paper. A single group public key, instead of all public keys of individual members, is use...

    Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang in Information Security and Privacy (1996)

  20. No Access

    Chapter and Conference Paper

    A new subgraph of minimum weight triangulations

    In this paper, two sufficient conditions for identifying a subgraph of minimum weight triangulation of a planar point set are presented. These conditions are based on local geometric properties of an identifyi...

    Cao An Wang, Francis Chin, Yin-Feng Xu in Algorithms and Computation (1996)

previous disabled Page of 819