Chebyshev polynomials

Results: 143



#Item
41On the numerical solution of second order differential equations in the high-frequency regime James Bremerb,˚, Vladimir Rokhlina a b

On the numerical solution of second order differential equations in the high-frequency regime James Bremerb,˚, Vladimir Rokhlina a b

Add to Reading List

Source URL: www.math.ucdavis.edu

Language: English - Date: 2015-01-03 20:55:37
42

PDF Document

Add to Reading List

Source URL: www.sal.wisc.edu

Language: English - Date: 2015-03-20 12:35:46
43Microsoft Word - chebyReport2.doc

Microsoft Word - chebyReport2.doc

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2007-11-18 13:37:43
44
 
 

















































  O
P
-
S
F

N
E
T

-

Volume
16,



 
 

















































 O
P
-
S
F

N
E
T

-

Volume
16,


Add to Reading List

Source URL: staff.fnwi.uva.nl

Language: English - Date: 2009-09-15 16:46:27
45   O P - S F N E T - Volume 19, Number 2 – March 15, 2012 Editors: Diego Dominici Martin Muldoon

  O P - S F N E T - Volume 19, Number 2 – March 15, 2012 Editors: Diego Dominici Martin Muldoon

Add to Reading List

Source URL: staff.fnwi.uva.nl

Language: English - Date: 2012-03-19 06:52:38
46Notes on Chebyshev Series and Computer Algebra Richard J. Fateman Computer Science Division Electrical Engineering and Computer Sciences University of California at Berkeley January 17, 2013

Notes on Chebyshev Series and Computer Algebra Richard J. Fateman Computer Science Division Electrical Engineering and Computer Sciences University of California at Berkeley January 17, 2013

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-01-17 14:08:41
47O P - S F N E T - Volume 19, Number 4 – July 15, 2012 Editors: Diego Dominici Martin Muldoon

O P - S F N E T - Volume 19, Number 4 – July 15, 2012 Editors: Diego Dominici Martin Muldoon

Add to Reading List

Source URL: staff.fnwi.uva.nl

Language: English - Date: 2012-07-16 09:59:18
48Weaknesses in a Recently Proposed RFID Authentication Protocol Mete Akg¨ un1 , and M. Ufuk C ¸ aˇglayan2 1

Weaknesses in a Recently Proposed RFID Authentication Protocol Mete Akg¨ un1 , and M. Ufuk C ¸ aˇglayan2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-18 04:24:22
49ALGEBRA 2/TRIGONOMETRY The University of the State of New York REGENTS HIGH SCHOOL EXAMINATION ALGEBRA 2/TRIGONOMETRV Thursday, January 29, :15a.m to 12:15 p.m., only

ALGEBRA 2/TRIGONOMETRY The University of the State of New York REGENTS HIGH SCHOOL EXAMINATION ALGEBRA 2/TRIGONOMETRV Thursday, January 29, :15a.m to 12:15 p.m., only

Add to Reading List

Source URL: www.jmap.org

Language: English - Date: 2015-01-31 15:29:28
5014 Architectures  This chapter looks at some of the ways that functions can be connected to interpolate among and extrapolate beyond observations. The essence of successful generalization lies in finding a form that is j

14 Architectures This chapter looks at some of the ways that functions can be connected to interpolate among and extrapolate beyond observations. The essence of successful generalization lies in finding a form that is j

Add to Reading List

Source URL: fab.cba.mit.edu

Language: English - Date: 2014-04-14 17:27:29