Results 1  10
of
860,540
On relative errors of floatingpoint operations: optimal bounds and applications. Research report hal00934443, available at http: //hal.inria.fr/hal00934443
"... Abstract. Rounding error analyses of numerical algorithms are most often carried out via repeated applications of the socalled standard models of floatingpoint arithmetic. Given a roundtonearest function fl and barring underflow and overflow, such models bound the relative errors E1(t) = t − f ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
Abstract. Rounding error analyses of numerical algorithms are most often carried out via repeated applications of the socalled standard models of floatingpoint arithmetic. Given a roundtonearest function fl and barring underflow and overflow, such models bound the relative errors E1(t) = t
FloatingPoint LLL Revisited
, 2005
"... The LenstraLenstraLovász lattice basis reduction algorithm (LLL or L³) is a very popular tool in publickey cryptanalysis and in many other fields. Given an integer ddimensional lattice basis with vectors of norm less than B in an ndimensional space, L³ outputs a socalled L³reduced basis in po ..."
Abstract

Cited by 53 (7 self)
 Add to MetaCart
in polynomial time O(d 5 n log³ B), using arithmetic operations on integers of bitlength O(d log B). This worstcase complexity is problematic for lattices arising in cryptanalysis where d or/and log B are often large. As a result, the original L³ is almost never used in practice. Instead, one applies floatingpoint
Exokernel: An Operating System Architecture for ApplicationLevel Resource Management
, 1995
"... We describe an operating system architecture that securely multiplexes machine resources while permitting an unprecedented degree of applicationspecific customization of traditional operating system abstractions. By abstracting physical hardware resources, traditional operating systems have signifi ..."
Abstract

Cited by 724 (24 self)
 Add to MetaCart
We describe an operating system architecture that securely multiplexes machine resources while permitting an unprecedented degree of applicationspecific customization of traditional operating system abstractions. By abstracting physical hardware resources, traditional operating systems have
ERROR BOUNDS ON COMPLEX FLOATINGPOINT MULTIPLICATION WITH AN FMA
, 2013
"... Abstract. The accuracy analysis of complex floatingpoint multiplication done by Brent, Percival, and Zimmermann [Math. Comp., 76:1469–1481, 2007] is extended to the case where a fused multiplyadd (FMA) operation is available. Considering floatingpoint arithmetic with rounding to nearest and unit ..."
Abstract

Cited by 1 (1 self)
 Add to MetaCart
optimality is established for each algorithm thanks to the explicit construction of floatingpoint inputs for which we prove that the normwise relative error then generated satisfies z/z − 1  → 2u as u → 0. All our results hold for IEEE floatingpoint arithmetic, with radix β � 2, precision p � 2
Good ErrorCorrecting Codes based on Very Sparse Matrices
, 1999
"... We study two families of errorcorrecting codes defined in terms of very sparse matrices. "MN" (MacKayNeal) codes are recently invented, and "Gallager codes" were first investigated in 1962, but appear to have been largely forgotten, in spite of their excellent properties. The ..."
Abstract

Cited by 741 (23 self)
 Add to MetaCart
We study two families of errorcorrecting codes defined in terms of very sparse matrices. "MN" (MacKayNeal) codes are recently invented, and "Gallager codes" were first investigated in 1962, but appear to have been largely forgotten, in spite of their excellent properties
Monitors: An Operating System Structuring Concept
 Communications of the ACM
, 1974
"... This is a digitized copy derived from an ACM copyrighted work. It is not guaranteed to be an accurate copy of the author's original work. This paper develops BrinchHansen's concept of a monitor as a method of structuring an operating system. It introduces a form of synchronization, descri ..."
Abstract

Cited by 561 (0 self)
 Add to MetaCart
, describes a possible rnctltotl of implementation in terms of semaphorcs and gives a suitable proof rule. Illustrative examples include a single rcsourcc scheduler, a bounded buffer, an alarm clock, a buffer pool, a disk head optimizer, and a version of the problem of readers and writers. Key Words
Interior Point Methods in Semidefinite Programming with Applications to Combinatorial Optimization
 SIAM Journal on Optimization
, 1993
"... We study the semidefinite programming problem (SDP), i.e the problem of optimization of a linear function of a symmetric matrix subject to linear equality constraints and the additional condition that the matrix be positive semidefinite. First we review the classical cone duality as specialized to S ..."
Abstract

Cited by 557 (12 self)
 Add to MetaCart
to SDP. Next we present an interior point algorithm which converges to the optimal solution in polynomial time. The approach is a direct extension of Ye's projective method for linear programming. We also argue that most known interior point methods for linear programs can be transformed in a
The Skyline Operator
 IN ICDE
, 2001
"... We propose to extend database systems by a Skyline operation. This operation filters out a set of interesting points from a potentially large set of data points. A point is interesting if it is not dominated by any other point. For example, a hotel might be interesting for somebody traveling to Nass ..."
Abstract

Cited by 558 (3 self)
 Add to MetaCart
We propose to extend database systems by a Skyline operation. This operation filters out a set of interesting points from a potentially large set of data points. A point is interesting if it is not dominated by any other point. For example, a hotel might be interesting for somebody traveling
Disconnected Operation in the Coda File System
 ACM Transactions on Computer Systems
, 1992
"... Disconnected operation is a mode of operation that enables a client to continue accessing critical data during temporary failures of a shared data repository. An important, though not exclusive, application of disconnected operation is in supporting portable computers. In this paper, we show that di ..."
Abstract

Cited by 1014 (36 self)
 Add to MetaCart
Disconnected operation is a mode of operation that enables a client to continue accessing critical data during temporary failures of a shared data repository. An important, though not exclusive, application of disconnected operation is in supporting portable computers. In this paper, we show
Results 1  10
of
860,540