scispace - formally typeset
Open AccessJournal Article

The art of computer programming. Vol.2: Seminumerical algorithms

Donald E. Knuth
- 01 Jan 1981 - 
Reads0
Chats0
About
This article is published in Literacy.The article was published on 1981-01-01 and is currently open access. It has received 2636 citations till now. The article focuses on the topics: Computer programming.

read more

Citations
More filters
Book ChapterDOI

Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick

TL;DR: The Montgomery trick is applied to reduce the number of inversions required with a width window w from O(22w) to O(w), which enables the removal of points that will not be used later from the process of precomputation.
Journal ArticleDOI

Statistical Debugging for Simulations

TL;DR: This work presents two research contributions, elastic predicates and many-valued labeling functions, that enable debuggers designed for general-purpose software to become more effective for simulations employing random variates and continuous numbers.
Proceedings Article

Generating CP-Nets uniformly at random

TL;DR: A novel algorithm for provably generating acyclic CP-nets uniformly at random is provided, which is computationally efficient and allows for multi-valued domains and arbitrary bounds on the indegree in the dependency graph.
Journal ArticleDOI

Blocking Self-Avoiding Walks Stops Cyber-Epidemics: A Scalable GPU-Based Approach

TL;DR: This work investigates the Spread Interdiction problems that seek the most effective links (or nodes) for removal under the well-known Linear Threshold model and proposes novel CPU-GPU methods that scale to networks with billions of edges yet possess arigorous theoretical guarantee on the solution quality.
Dissertation

On the security of Java Card platforms against hardware attacks

TL;DR: This thesis proves that the type-safety property, the control-flow integrity and the application isolation can be tampered with by the combination of adequate fault injections and malicious applications and presents different approaches allowing to improve the resistance of Java Cards and Java Card applications against combined attacks.