scispace - formally typeset
Open AccessJournal Article

The art of computer programming. Vol.2: Seminumerical algorithms

Donald E. Knuth
- 01 Jan 1981 - 
Reads0
Chats0
About
This article is published in Literacy.The article was published on 1981-01-01 and is currently open access. It has received 2636 citations till now. The article focuses on the topics: Computer programming.

read more

Citations
More filters
Patent

Digital information protecting method and apparatus, and computer accessible recording medium

TL;DR: In this article, a method for protecting digital information is proposed, which includes converting a protected address range into a plurality of address blocks based on a preset conversion unit, and generating an address block rearranging rule using the address blocks as a parameter.
Journal ArticleDOI

On the subfield subcodes of Hermitian codes

TL;DR: Some of the subfield subcodes of Hermitian codes are at least as good as the previously known codes, and the existence of good long codes is shown.
Journal ArticleDOI

On Cayley conditions for billiards inside ellipsoids

TL;DR: In this article, the original matrix formulation of the generalized Cayley conditions was rewritten as a simpler polynomial one and several algebraic relations between caustic parameters and ellipsoidal parameters gave rise to non-singular periodic trajectories.
Journal ArticleDOI

An efficient algorithm for choosing scattering directions in Monte Carlo work with arbitrary phase functions

TL;DR: An efficient Monte Carlo algorithm for choosing a new direction of a photon after a scattering interaction is described, which chooses a scattering angle by linear interpolation in a table of the inverse cumulative scattering probability.
Journal ArticleDOI

Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography

TL;DR: In this paper, the authors investigate the use of domain specific language and compiler techniques to assist in description and optimisation of cryptographic software, focusing on elliptic curve cryptography (ECC) in particular.