Abstract: Computations on encrypted data can, in principle, be performed using homomorphic encryption. However, due to certain limitations, only algorithms based on polynomial functions can be ...
1 Warwick Mathematics Institute, The University of Warwick, Coventry, United Kingdom 2 School of Computer and Information Engineering, Luoyang Institute of Science and Technology, Luoyang, China To ...
A method of near-minimax polynomial approximation is described. As a by-product, this method provides a formula for an estimate of the maximum error associated with a ...
Polynomial equations are a cornerstone of modern science, providing a mathematical basis for celestial mechanics, computer graphics, market growth predictions and much more. But although most high ...
Dominique Guillot, an associate professor in the University of Delaware's Department of Mathematical Sciences, was recently awarded the grant "Polynomial approximation in spaces of analytic functions" ...
The method of nested multiplication is commonly used in function evaluation routines to evaluate approximation polynomials. New polynomial evaluation methods have been developed in recent years which ...
ABSTRACT: The development of new technologies in smart cities is often hailed as it becomes a necessity to solve many problems like energy consumption and transportation. Wireless networks are part of ...
This research was sponsored in part by the Office of Naval Research, United States Navy, and by the Office of Scientific Research, Air Research and Development Command. Note: The article usage is ...
Note: The article usage is presented with a three- to four-day delay and will update daily once available. Due to ths delay, usage data will not appear immediately following publication. Citation ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results