General algorithm of computation of c-table and detection of valleys
We present a review of all interesting results concerning the c-table obtained by the authors for the last two decades. These results are not widely known because they were presented in publications of limited circulation. We discuss different computational aspects of software producing the c-tables...
Saved in:
| Published in: | Український математичний журнал |
|---|---|
| Date: | 2010 |
| Main Authors: | Gilewicz, J., Pindor, M. |
| Format: | Article |
| Language: | English |
| Published: |
Інститут математики НАН України
2010
|
| Subjects: | |
| Online Access: | https://nasplib.isofts.kiev.ua/handle/123456789/166161 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Digital Library of Periodicals of National Academy of Sciences of Ukraine |
| Cite this: | General algorithm of computation of c-table and detection of valleys / J. Gilewicz, M. Pindor // Український математичний журнал. — 2010. — Т. 62, № 6. — С. 762–772. — Бібліогр.: 11 назв. — англ. |
Institution
Digital Library of Periodicals of National Academy of Sciences of UkraineSimilar Items
General algorithm of computation of $c$-table and detection of valleys
by: Gilewicz, J., et al.
Published: (2010)
by: Gilewicz, J., et al.
Published: (2010)
On the relation between measures defining the Stieltjes and the inverted Stieltjes functions
by: Gilewicz, J., et al.
Published: (2010)
by: Gilewicz, J., et al.
Published: (2010)
Generalized algorithm of computational material design
by: S. I. Sidorenko, et al.
Published: (2014)
by: S. I. Sidorenko, et al.
Published: (2014)
Algorithms, that implement set-theoretic operations on tables and multitables
by: I. S. Kanarska
Published: (2019)
by: I. S. Kanarska
Published: (2019)
Estimates of the complexity of algorithms of implementation of set-theoretic operation in table algebras
by: I. S. Kanarskaja
Published: (2016)
by: I. S. Kanarskaja
Published: (2016)
Algorithm for Detection and Identification of Slow Targets
by: Sytnik, O. V.
Published: (2013)
by: Sytnik, O. V.
Published: (2013)
About relationship between table algebra of infinite tables and multiset table algebra
by: I. M. Hlushko
Published: (2018)
by: I. M. Hlushko
Published: (2018)
About relationship between table algebra of infinite tables and multiset table algebra
by: Glushko, I.M.
Published: (2018)
by: Glushko, I.M.
Published: (2018)
Materials of the round table “Analytical methods and computer experiment in soft matter theory”
by: Trokhymchuk, A., et al.
Published: (2001)
by: Trokhymchuk, A., et al.
Published: (2001)
About efficiency of computing algorithms for computers of hybrid architecture
by: O. V. Chystiakov
Published: (2019)
by: O. V. Chystiakov
Published: (2019)
Automatic detection algorithm for vulnerability of SQL-injection
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Method to detect signals of eddy current flaw detection with small computer resource capacity
by: M. O. Redka, et al.
Published: (2020)
by: M. O. Redka, et al.
Published: (2020)
Application of computer vision methods to detect fire in the premises
by: V. M. Tereshchenko, et al.
Published: (2017)
by: V. M. Tereshchenko, et al.
Published: (2017)
Optimal algorithms for computing multiple integrals
by: B. Bandyrskii, et al.
Published: (2017)
by: B. Bandyrskii, et al.
Published: (2017)
General proximal point algorithm for monotone operators
by: M. Eslamian, et al.
Published: (2016)
by: M. Eslamian, et al.
Published: (2016)
Outer Set Operations of Table Algebra of Infinite Tables
by: I. M. Glushko
Published: (2016)
by: I. M. Glushko
Published: (2016)
On the relation between measures defining the Stieltjes and the inverted Stieltjes functions
by: Gilewicz, J., et al.
Published: (2010)
by: Gilewicz, J., et al.
Published: (2010)
Precise estimates of the time complexity of implementing the algorithms of set-theoretic operations in table algebra
by: V. N. Redko, et al.
Published: (2017)
by: V. N. Redko, et al.
Published: (2017)
Elements of concrete algorithmics: computability and solvability
by: O. I. Provotar, et al.
Published: (2020)
by: O. I. Provotar, et al.
Published: (2020)
Elements of concrete algorithmics: computability and solvability
by: Provotar, O.I., et al.
Published: (2020)
by: Provotar, O.I., et al.
Published: (2020)
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Outer Set Operations of Table Algebra of Infinite Tables
by: Glushko, I.N.
Published: (2018)
by: Glushko, I.N.
Published: (2018)
General proximal point algorithm for monotone operators
by: Eslamian, M., et al.
Published: (2016)
by: Eslamian, M., et al.
Published: (2016)
East mediterranean products on the table of Lviv burghers in the XV—XVII c.
by: I. Lylo
Published: (2018)
by: I. Lylo
Published: (2018)
Forecasting of disaster floods in Dniester valley
by: O. M. Adamenko, et al.
Published: (2022)
by: O. M. Adamenko, et al.
Published: (2022)
Forecasting of disaster floods in Dniester valley
by: Adamenko, Oleh M., et al.
Published: (2022)
by: Adamenko, Oleh M., et al.
Published: (2022)
Table of Contents
by: Problems of Cryobiology and Cryomedicine, Editorial Board
Published: (2022)
by: Problems of Cryobiology and Cryomedicine, Editorial Board
Published: (2022)
Table of Contents
Published: (2005)
Published: (2005)
Table of Contents
Published: (2003)
Published: (2003)
Table of Contents
by: Problems of Cryobiology and Cryomedicine, Editorial Board
Published: (2020)
by: Problems of Cryobiology and Cryomedicine, Editorial Board
Published: (2020)
Phytocoenodiversity of the upper valley of the Tysa River
by: Ye. Yakubenko
Published: (2016)
by: Ye. Yakubenko
Published: (2016)
Algebra of algorithms with the data and forecasting of computing process
by: Doroshenko, A.Yu., et al.
Published: (2025)
by: Doroshenko, A.Yu., et al.
Published: (2025)
Application the Aho-Corasick Algorithm for Improving a Intrusion Detection System
by: M. M. Karimov, et al.
Published: (2021)
by: M. M. Karimov, et al.
Published: (2021)
Application of myriad filtering in real-time trend detection algorithms
by: Tulyakova, N., et al.
Published: (2024)
by: Tulyakova, N., et al.
Published: (2024)
Syntaxonomy of the Lemnetea class in the Southern Bug valley
by: S. M. Yemelianova
Published: (2018)
by: S. M. Yemelianova
Published: (2018)
Genetic Algorithms as Computational Methods for Finite-Dimensional Optimization
by: N. M. Hulaieva, et al.
Published: (2021)
by: N. M. Hulaieva, et al.
Published: (2021)
Three-dimensional visualization of the detected defects by eddy current computing tomography
by: O. O. Vertii, et al.
Published: (2021)
by: O. O. Vertii, et al.
Published: (2021)
Algorithmic computation of principal posets using Maple and Python
by: M. Gasiorek, et al.
Published: (2014)
by: M. Gasiorek, et al.
Published: (2014)
Algorithmic computation of principal posets using Maple and Python
by: Gasiorek, M., et al.
Published: (2014)
by: Gasiorek, M., et al.
Published: (2014)
Analysis of the Chirplet Transform-Based Algorithm for Radar Detection of Accelerated Targets
by: V. G. Galushko, et al.
Published: (2017)
by: V. G. Galushko, et al.
Published: (2017)
Similar Items
-
General algorithm of computation of $c$-table and detection of valleys
by: Gilewicz, J., et al.
Published: (2010) -
On the relation between measures defining the Stieltjes and the inverted Stieltjes functions
by: Gilewicz, J., et al.
Published: (2010) -
Generalized algorithm of computational material design
by: S. I. Sidorenko, et al.
Published: (2014) -
Algorithms, that implement set-theoretic operations on tables and multitables
by: I. S. Kanarska
Published: (2019) -
Estimates of the complexity of algorithms of implementation of set-theoretic operation in table algebras
by: I. S. Kanarskaja
Published: (2016)