scispace - formally typeset
Open AccessJournal Article

The art of computer programming. Vol.2: Seminumerical algorithms

Donald E. Knuth
- 01 Jan 1981 - 
Reads0
Chats0
About
This article is published in Literacy.The article was published on 1981-01-01 and is currently open access. It has received 2636 citations till now. The article focuses on the topics: Computer programming.

read more

Citations
More filters
Proceedings ArticleDOI

Parallel random numbers: as easy as 1, 2, 3

TL;DR: It is demonstrated that independent, keyed transformations of counters produce a large alternative class of PRNGs with excellent statistical properties, ideally suited to modern multi- core CPUs, GPUs, clusters, and special-purpose hardware.
Book

Iterated Function Systems and Permutation Representations of the Cuntz Algebra

TL;DR: In this paper, the universal permutative multiplicity-free representation of O(n) O(N)-N$ was introduced and a general model of the cycle and atom structure was proposed.
Book ChapterDOI

The XTR Public Key System

TL;DR: The XTR public key system as discussed by the authors is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field, which leads to substantial savings both in communication and computational overhead without compromising security.
Journal ArticleDOI

The gamma model and its discipline of programming

TL;DR: A new formalism called GAMMA is presented in which programs are described as multiset transformers and the relevance of this formalism with respect to program development is shown by proposing a systematic program derivation method and illustrating it with several nontrivial problems.
Proceedings ArticleDOI

Fast authenticated key establishment protocols for self-organizing sensor networks

TL;DR: A hybrid authenticated key establishment scheme, which exploits the difference in capabilities between security managers and sensors, and put the cryptographic burden where the resources are less constrained, which is better than all the other public-key based key establishment protocols studied.