Search Results - Computing the number of zeros of a function

Refine Results
  1. 1

    Computing the Zeros of Characteristic Function of Time-Delayed Systems by Du, Huanchao, Shen, Jieshi, Liu, Ying

    ISSN: 1549-7747, 1558-3791
    Published: New York IEEE 01.03.2022
    “…In this brief, a simple algorithm based on the contour integration is presented for computing the zeros of characteristic function of time-delayed systems with invariant time constant…”
    Get full text
    Journal Article
  2. 2

    Computing the zeros of cross-product combinations of the Bessel functions with complex order by Kershaw, Jeff, Obata, Takayuki

    ISSN: 2590-0374, 2590-0374
    Published: Elsevier B.V 01.11.2025
    Published in Results in applied mathematics (01.11.2025)
    “…The zeros of cross-product combinations of the Bessel functions are often required as the eigenvalues in boundary-value problems with annular or tubular symmetry…”
    Get full text
    Journal Article
  3. 3

    On Computing the Resultant of a Polynomial and an Entire Function by Kuzovatov, V. I., Kytmanov, A. A., Myshkina, E. K.

    ISSN: 0361-7688, 1608-3261
    Published: Moscow Pleiades Publishing 01.02.2022
    Published in Programming and computer software (01.02.2022)
    “… This allows one to determine whether these functions have common zeros or not. An algorithm for computing an approximation to the resultant of a polynomial…”
    Get full text
    Journal Article
  4. 4

    Computation of Binary Arithmetic Sum Over an Asymmetric Diamond Network by Zhang, Ruze, Guang, Xuan, Yang, Shenghao, Niu, Xueyan, Bai, Bo

    ISSN: 2641-8770, 2641-8770
    Published: Piscataway IEEE 2024
    “… capacity, which is defined as the average number of times that the function can be computed with zero…”
    Get full text
    Journal Article
  5. 5

    Secure Network Function Computation for Linear Functions-Part I: Source Security by Guang, Xuan, Bai, Yang, Yeung, Raymond W.

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.01.2024
    Published in IEEE transactions on information theory (01.01.2024)
    “… The secure computing capacity for the above model is defined as the maximum average number of times that the target function can be securely computed with zero error at the sink node with the given…”
    Get full text
    Journal Article
  6. 6

    Robust Network Function Computation by Wei, Hengjia, Xu, Min, Ge, Gennian

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.11.2023
    Published in IEEE transactions on information theory (01.11.2023)
    “… τ errors is the average number of times that the target function can be computed with zero error for one use of the network with at most…”
    Get full text
    Journal Article
  7. 7

    zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing by Zhang, Yancheng, Zheng, Mengxin, Chen, Xun, Hu, Jingtong, Shi, Weidong, Ju, Lei, Solihin, Yan, Lou, Qian

    Published: IEEE 22.06.2025
    “… The cryptographic method known as Zero-Knowledge Proof (ZKP) is renowned for facilitating private and verifiable computing…”
    Get full text
    Conference Proceeding
  8. 8

    A frequency-independent and parallel algorithm for computing the zeros of strictly proper rational transfer functions by Zadehgol, Ata

    ISSN: 0096-3003, 1873-5649
    Published: Elsevier Inc 01.02.2016
    Published in Applied mathematics and computation (01.02.2016)
    “…We develop an algorithm for computation of the zeros of a strictly proper rational transfer function in partial fraction form, by transforming the problem of finding the roots of the determinant…”
    Get full text
    Journal Article
  9. 9

    ASMCC+: A Secure Authentication Scheme for Mobile Cloud Computing Environment Based on Zero Trust Architecture by Jakir Hossain, Md, Seid, Abegaz Mohammed, Abishu, Hayla Nahom, Dharejo, Fayaz Ali, Jhaveri, Rutvij H., Erbad, Aiman, Alathbah, Moath

    ISSN: 0098-3063, 1558-4127
    Published: New York IEEE 01.08.2024
    Published in IEEE transactions on consumer electronics (01.08.2024)
    “…Authenticated key exchange (AKE) schemes that adopt public-key encryption (PKE) are comprehensively applied in mobile cloud computing environments…”
    Get full text
    Journal Article
  10. 10

    On the number of the rational zeros of linearized polynomials and the second-order nonlinearity of cubic Boolean functions by Mesnager, Sihem, Kim, Kwang Ho, Jo, Myong Song

    ISSN: 1936-2447, 1936-2455
    Published: New York Springer US 01.07.2020
    Published in Cryptography and communications (01.07.2020)
    “…Determine the number of the rational zeros of any given linearized polynomial is one of the vital problems in finite field theory, with applications in modern symmetric cryptosystems…”
    Get full text
    Journal Article
  11. 11

    A Themed Issue on Mathematical Inequalities, Analytic Combinatorics and Related Topics in Honor of Professor Feng Qi

    ISBN: 9783036590004, 3036590013, 3036590005, 9783036590011
    Published: Basel MDPI - Multidisciplinary Digital Publishing Institute 2023
    “…The purpose of this Special Issue is to pay tribute to the significant contributions made by Professor Feng Qi in these fields and to provide some important…”
    Get full text
    eBook
  12. 12

    No-Signalling-Assisted Zero-Error Capacity of Quantum Channels and an Information Theoretic Interpretation of the Lovász Number by Runyao Duan, Winter, Andreas

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.02.2016
    Published in IEEE transactions on information theory (01.02.2016)
    “…We study the one-shot zero-error classical capacity of a quantum channel assisted by quantum no-signalling correlations, and the reverse problem of exact simulation of a prescribed channel by a noiseless classical one…”
    Get full text
    Journal Article
  13. 13

    Orthogonal Polynomials and Special Functions: Recent Trends and Their Applications

    ISBN: 9783725818549, 9783725818532, 3725818533, 3725818541
    Published: MDPI - Multidisciplinary Digital Publishing Institute 2024
    “… As such, the number of theoretical and applied problems solved using orthogonal polynomials and special functions is constantly…”
    Get full text
    eBook
  14. 14

    The second-order zero differential spectra of some functions over finite fields by Garg, Kirpa, Hasan, Sartaj Ul, Riera, Constanza, Stănică, Pantelimon

    ISSN: 1936-2447, 1936-2455
    Published: New York Springer US 01.07.2025
    Published in Cryptography and communications (01.07.2025)
    “… (which is the same as the second-order zero differential uniformity in even characteristic) of perfect nonlinear functions is 0 on F p n ( p prime…”
    Get full text
    Journal Article
  15. 15

    Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits by Hausken, Kjell, Welburn, Jonathan W.

    ISSN: 1387-3326, 1572-9419
    Published: New York Springer US 01.12.2021
    Published in Information systems frontiers (01.12.2021)
    “…Two players strike balances between allocating resources for defense and production of zero-day exploits…”
    Get full text
    Journal Article
  16. 16

    Size-extensive seniority-zero energy functionals derived from configuration interaction with double excitations by Vu, Nam, DePrince, A Eugene

    ISSN: 1089-7690, 1089-7690
    Published: 28.06.2020
    Published in The Journal of chemical physics (28.06.2020)
    “…) can reproduce DOCI energies with only a quadratic number of wave function parameters, and, when neglecting the cost associated with any two-electron integral transformations, these parameters…”
    Get more information
    Journal Article
  17. 17

    Computing Wiener and Hyper-Wiener Indices of Zero-Divisor Graph of ℤℊ3×ℤI1I2 by Liu, Yonghong, Rauf, Abdul, AdnanAslam, Ishaq, Saira, Issa, Abudulai

    ISSN: 2314-8896, 2314-8888
    Published: New York Hindawi 2022
    Published in Journal of function spaces (2022)
    “… The zero-divisor graph assigned to S is an undirected graph, denoted as YS with vertex set V(Y…”
    Get full text
    Journal Article
  18. 18

    A direct construction of complete complementary code with zero correlation zone property for prime-power length by Kumar, Nishant, Majhi, Sudhan, Upadhyay, Ashish K.

    ISSN: 1936-2447, 1936-2455
    Published: New York Springer US 01.03.2024
    Published in Cryptography and communications (01.03.2024)
    “…) and zero correlation zone (ZCZ) sequence set and which we call complete complementary-ZCZ (CC-ZCZ) code set…”
    Get full text
    Journal Article
  19. 19

    Computing the zeros of the partial sums of the Riemann zeta function by Mora, G., Sepulcre, J. M.

    ISSN: 0373-3114, 1618-1891
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2015
    Published in Annali di matematica pura ed applicata (01.10.2015)
    “…In this paper, we introduce a formula for the exact number of zeros of every partial sum of the Riemann zeta function inside infinitely many rectangles…”
    Get full text
    Journal Article
  20. 20

    Improved Upper Bound on the Network Function Computing Capacity by Guang, Xuan, Yeung, Raymond W., Yang, Shenghao, Li, Congduan

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.06.2019
    Published in IEEE transactions on information theory (01.06.2019)
    “… The computing rate of a network code that can compute the target function over the network is the average number of times that the target function is computed with zero error for one use of the network…”
    Get full text
    Journal Article