• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
An Efficient Algorithm for Finding Similar Short Substrings from
An Efficient Algorithm for Finding Similar Short Substrings from

E - Read
E - Read

Longest Common Substring with Approximately k Mismatches
Longest Common Substring with Approximately k Mismatches

Solve Exponential Equations Using Common Logs
Solve Exponential Equations Using Common Logs

V. Clustering
V. Clustering

Logarithms and Savings Accounts
Logarithms and Savings Accounts

3. Keyword Cover Search Module
3. Keyword Cover Search Module

Bessel Functions and Their Application to the Eigenvalues of the
Bessel Functions and Their Application to the Eigenvalues of the

... The first task in this project was to compute Bessel functions, which was done using Miller’s downwards recurrence algorithm. The algorithm applies the recurrence relation Jn−1 (x) = 2n x Jn (x) − Jn+1 (x), where n is the order of Bessel function J—it computes Bessel functions in descending order fr ...
Unsupervised Feature Selection for the k
Unsupervised Feature Selection for the k

... a priori guarantees regarding the quality of the clustering after feature selection is performed, we chose to report results on the optimal value of the k-means clustering objective (the Fopt of Definition 1). This metric of accuracy has been extensively used in the Theoretical Computer Science comm ...
26 Optimal Bounds for Johnson-Lindenstrauss
26 Optimal Bounds for Johnson-Lindenstrauss

Data-Oblivious Data Structures
Data-Oblivious Data Structures

A+B
A+B

... Big-Omega and Big-Theta Nation • Definition 2: Let f and g be functions from the set of integers or the set of real numbers to the set of real numbers. • We say that f(x) is Ω(g(x)) if there are positive constants C and k such that |f(x)|≥ C|g(x)| Whenever x > k. ( this is read as “f(x) is big-Omeg ...
Introduction to Computer Science
Introduction to Computer Science

... Information stored and processed by computer is a small fragment of reality containing essential data to solve stated problem. We have to think which informations are essential, which can help us and which are completely useless. We have to think how we will represent choosen informations. The last ...
Quiz 5 - BrainMass
Quiz 5 - BrainMass

Developing And Comparing Numerical Methods For Computing The Inverse Fourier Transform  Abstract
Developing And Comparing Numerical Methods For Computing The Inverse Fourier Transform Abstract

... The Fourier transform is (up to a negative sign and a scalar factor depending on the definition used) its own inverse. Thus, a numerical method that computes one, computes the other. However, with the exception of the Gaussian function ( e  x ), functions and their Fourier transforms have different ...
W. Dean. Algorithms and the mathematical foundations of computer
W. Dean. Algorithms and the mathematical foundations of computer

Counting Inversions, Offline Orthogonal Range Counting, and Related Problems Timothy M. Chan
Counting Inversions, Offline Orthogonal Range Counting, and Related Problems Timothy M. Chan

Lecture3.pdf
Lecture3.pdf

CS440 - Assignment 3
CS440 - Assignment 3

Answers Exercises week 2
Answers Exercises week 2

Paper - George Karypis
Paper - George Karypis

A Mathematical Framework for Parallel Computing of Discrete
A Mathematical Framework for Parallel Computing of Discrete

6.896 Project Presentations
6.896 Project Presentations

... Design and implement a dynamic processorallocation system for adaptively parallel jobs (jobs for which the number of processors that can be used without waste varies during execution) The problem of allocating processors to adaptively parallel jobs is called the adaptively parallel processor-allocat ...
Factoring via Strong Lattice Reduction Algorithms 1 Introduction
Factoring via Strong Lattice Reduction Algorithms 1 Introduction

(I) Fourier Sine Transform
(I) Fourier Sine Transform

< 1 2 3 4 5 6 ... 10 >

Fast Fourier transform

  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report