General algorithm of computation of $c$-table and detection of valleys
We present a review of all interesting results concerning the c-table obtained by the authors for the last two decades. These results are not widely known because they were presented in publications of limited circulation. We discuss different computational aspects of software producing the $c$-tabl...
Saved in:
| Date: | 2010 |
|---|---|
| Main Authors: | Gilewicz, J., Pindor, M., Гілевич, Я. Я., Піндор, М. |
| Format: | Article |
| Language: | English |
| Published: |
Institute of Mathematics, NAS of Ukraine
2010
|
| Online Access: | https://umj.imath.kiev.ua/index.php/umj/article/view/2907 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Ukrains’kyi Matematychnyi Zhurnal |
| Download file: | |
Institution
Ukrains’kyi Matematychnyi ZhurnalSimilar Items
General algorithm of computation of c-table and detection of valleys
by: Gilewicz, J., et al.
Published: (2010)
by: Gilewicz, J., et al.
Published: (2010)
On the relation between measures defining the Stieltjes and the inverted Stieltjes functions
by: Gilewicz, J., et al.
Published: (2010)
by: Gilewicz, J., et al.
Published: (2010)
Generalized algorithm of computational material design
by: S. I. Sidorenko, et al.
Published: (2014)
by: S. I. Sidorenko, et al.
Published: (2014)
Story of rational approximation for the class of Stieltjes functions: From Stieltjes to recent optimal estimations of errors
by: Gilewicz, J., et al.
Published: (1994)
by: Gilewicz, J., et al.
Published: (1994)
On the relation between measures defining the Stieltjes and the inverted Stieltjes functions
by: Gilewicz, J., et al.
Published: (2010)
by: Gilewicz, J., et al.
Published: (2010)
Algorithms, that implement set-theoretic operations on tables and multitables
by: I. S. Kanarska
Published: (2019)
by: I. S. Kanarska
Published: (2019)
Magic efficiency of approximation of smooth functions by weighted means of two $N$-point Padé approximants
by: Gilewicz, J., et al.
Published: (2018)
by: Gilewicz, J., et al.
Published: (2018)
Approximation of Smooth Functions by Weighted Means of N-Point Padé Approximants
by: Gilewicz, J., et al.
Published: (2013)
by: Gilewicz, J., et al.
Published: (2013)
Estimates of the complexity of algorithms of implementation of set-theoretic operation in table algebras
by: I. S. Kanarskaja
Published: (2016)
by: I. S. Kanarskaja
Published: (2016)
Algorithm for Detection and Identification of Slow Targets
by: Sytnik, O. V.
Published: (2013)
by: Sytnik, O. V.
Published: (2013)
About relationship between table algebra of infinite tables and multiset table algebra
by: I. M. Hlushko
Published: (2018)
by: I. M. Hlushko
Published: (2018)
About relationship between table algebra of infinite tables and multiset table algebra
by: Glushko, I.M.
Published: (2018)
by: Glushko, I.M.
Published: (2018)
Materials of the round table “Analytical methods and computer experiment in soft matter theory”
by: Trokhymchuk, A., et al.
Published: (2001)
by: Trokhymchuk, A., et al.
Published: (2001)
About efficiency of computing algorithms for computers of hybrid architecture
by: O. V. Chystiakov
Published: (2019)
by: O. V. Chystiakov
Published: (2019)
Automatic detection algorithm for vulnerability of SQL-injection
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Method to detect signals of eddy current flaw detection with small computer resource capacity
by: M. O. Redka, et al.
Published: (2020)
by: M. O. Redka, et al.
Published: (2020)
Application of computer vision methods to detect fire in the premises
by: V. M. Tereshchenko, et al.
Published: (2017)
by: V. M. Tereshchenko, et al.
Published: (2017)
Optimal algorithms for computing multiple integrals
by: B. Bandyrskii, et al.
Published: (2017)
by: B. Bandyrskii, et al.
Published: (2017)
General proximal point algorithm for monotone operators
by: M. Eslamian, et al.
Published: (2016)
by: M. Eslamian, et al.
Published: (2016)
Outer Set Operations of Table Algebra of Infinite Tables
by: I. M. Glushko
Published: (2016)
by: I. M. Glushko
Published: (2016)
Precise estimates of the time complexity of implementing the algorithms of set-theoretic operations in table algebra
by: V. N. Redko, et al.
Published: (2017)
by: V. N. Redko, et al.
Published: (2017)
General proximal point algorithm for monotone operators
by: Eslamian, M., et al.
Published: (2016)
by: Eslamian, M., et al.
Published: (2016)
Elements of concrete algorithmics: computability and solvability
by: O. I. Provotar, et al.
Published: (2020)
by: O. I. Provotar, et al.
Published: (2020)
Elements of concrete algorithmics: computability and solvability
by: Provotar, O.I., et al.
Published: (2020)
by: Provotar, O.I., et al.
Published: (2020)
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Outer Set Operations of Table Algebra of Infinite Tables
by: Glushko, I.N.
Published: (2018)
by: Glushko, I.N.
Published: (2018)
Forecasting of disaster floods in Dniester valley
by: O. M. Adamenko, et al.
Published: (2022)
by: O. M. Adamenko, et al.
Published: (2022)
Forecasting of disaster floods in Dniester valley
by: Adamenko, Oleh M., et al.
Published: (2022)
by: Adamenko, Oleh M., et al.
Published: (2022)
East mediterranean products on the table of Lviv burghers in the XV—XVII c.
by: I. Lylo
Published: (2018)
by: I. Lylo
Published: (2018)
Table of Contents
by: Problems of Cryobiology and Cryomedicine, Editorial Board
Published: (2022)
by: Problems of Cryobiology and Cryomedicine, Editorial Board
Published: (2022)
Table of Contents
Published: (2005)
Published: (2005)
Table of Contents
by: Problems of Cryobiology and Cryomedicine, Editorial Board
Published: (2020)
by: Problems of Cryobiology and Cryomedicine, Editorial Board
Published: (2020)
Table of Contents
Published: (2003)
Published: (2003)
Phytocoenodiversity of the upper valley of the Tysa River
by: Ye. Yakubenko
Published: (2016)
by: Ye. Yakubenko
Published: (2016)
Application the Aho-Corasick Algorithm for Improving a Intrusion Detection System
by: M. M. Karimov, et al.
Published: (2021)
by: M. M. Karimov, et al.
Published: (2021)
Algebra of algorithms with the data and forecasting of computing process
by: Doroshenko, A.Yu., et al.
Published: (2025)
by: Doroshenko, A.Yu., et al.
Published: (2025)
Syntaxonomy of the Lemnetea class in the Southern Bug valley
by: S. M. Yemelianova
Published: (2018)
by: S. M. Yemelianova
Published: (2018)
Application of myriad filtering in real-time trend detection algorithms
by: Tulyakova, N., et al.
Published: (2024)
by: Tulyakova, N., et al.
Published: (2024)
Genetic Algorithms as Computational Methods for Finite-Dimensional Optimization
by: N. M. Hulaieva, et al.
Published: (2021)
by: N. M. Hulaieva, et al.
Published: (2021)
Three-dimensional visualization of the detected defects by eddy current computing tomography
by: O. O. Vertii, et al.
Published: (2021)
by: O. O. Vertii, et al.
Published: (2021)
Similar Items
-
General algorithm of computation of c-table and detection of valleys
by: Gilewicz, J., et al.
Published: (2010) -
On the relation between measures defining the Stieltjes and the inverted Stieltjes functions
by: Gilewicz, J., et al.
Published: (2010) -
Generalized algorithm of computational material design
by: S. I. Sidorenko, et al.
Published: (2014) -
Story of rational approximation for the class of Stieltjes functions: From Stieltjes to recent optimal estimations of errors
by: Gilewicz, J., et al.
Published: (1994) -
On the relation between measures defining the Stieltjes and the inverted Stieltjes functions
by: Gilewicz, J., et al.
Published: (2010)