Your search for 38666 returns 3545 document(s) |
Blocking techniques in numerical software, (LNCS-Lecture Notes in Computer Science 1557) Hal 127-139 |
Author: Wilfried N. Gansterer; Dieter F. Kvasnicka; Cristoph W. Ueberhuber; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
HPF and numerical libraries, (LNCS-Lecture Notes in Computer Science 1557) Hal 140-152 |
Author: Harald J. Ehold; Wilfried N. Gansterer; Dieter F. Kvasnicka; Christoph W. Ueberhuber; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Parallel numerical algorithms for distributed memory machines, (LNCS-Lecture Notes in Computer Science 1557) Hal 581-583 |
Author: Pierre Bassomo; Ibrahima Sakho; Annie Corbel; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
MMIPPS - A software package for multitemporal and multispectral image processing on parallel systems, (LNCS-Lecture Notes in Computer Science 1557) Hal 398-407 |
Author: Jurgen Janoth; Markus M. Eisl; Erwin M. Bakker; Rogier van Sterkenburg; Roberta Borgia; Salvo Sabina; Fabio Volpe; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A monte-carlo method with inherent parallelism for numerical solving partial differential equations with boundary conditions, (LNCS-Lecture Notes in Computer Science 1557) Hal 117-126 |
Author: Erika Hausenblas; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hardware and software aspects for 3-D wavelet decomposition on shared memory MIMD computers, (LNCS-Lecture Notes in Computer Science 1557) Hal 347-356 |
Author: Rade Kutil; Andreas Uhl; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mind the gaps: a new splitting strategy for consis1tency techniques, (LNCS-Lecture Notes in Computer Science 3709) Hal 77-91 |
Author: Heikel Batnini; Claude Michel; Michel Rueher; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On solving soft temporal constraints using sat techniques, (LNCS-Lecture Notes in Computer Science 3709) Hal 607-621 |
Author: Hossein M. Sheini; Bart Peintner; Karem A. Sakallah; Martha E. Pollack; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Boolean and 2-adic numbers based techniques for verifying synchronous designs, (LNCS-Lecture Notes in Computer Science 1254) Hal 303 |
Author: Gerard Berry; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158 |
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|