Verified computation of matrix gamma function

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verified Computation of Square Roots of a Matrix

We present methods to compute verified square roots of a square matrix A. Given an approximation X to the square root, obtained by a classical floating point algorithm, we use interval arithmetic to find an interval matrix which is guaranteed to contain the error of X. Our approach is based on the Krawczyk method which we modify in two different ways in such a manner that the computational comp...

متن کامل

Verified Computation with Probabilities

Because machine calculations are prone to errors that can sometimes accumulate disastrously, computer scientists use special strategies called verified computation to ensure output is reliable. Such strategies are needed for computing with probability distributions. In probabilistic calculations, analysts have routinely assumed (i) probabilities and probability distributions are precisely speci...

متن کامل

Verified Computation of High-Order Poincaré Maps

Poincaré maps often prove to be invaluable tools in the study of long-term behaviour and qualitative properties of a given dynamical system. While the analytic theory of these maps is fully explored, finding numerical algorithms that allow the computation of Poincaré maps in concrete problems is far from trivial. For the verification it is desirable to approximate the Poincaré map over as large...

متن کامل

Fast verified computation for the solvent of the quadratic matrix equation

Two fast algorithms for numerically computing an interval matrix containing the solvent of the quadratic matrix equation AX2+BX+C = 0 with square matrices A, B, C and X are proposed. These algorithms require only cubic complexity, verify the uniqueness of the contained solvent, and do not involve iterative process. Let X̃ be a numerical approximation to the solvent. The first and second algorith...

متن کامل

Verified Implementations for Secure and Verifiable Computation

Formal verification of the security of software systems is gradually moving from the traditional focus on idealized models, to the more ambitious goal of producing verified implementations. This trend is also present in recent work targeting the verification of cryptographic software, but the reach of existing tools has so far been limited to cryptographic primitives, such as RSA-OAEP encryptio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Linear and Multilinear Algebra

سال: 2020

ISSN: 0308-1087,1563-5139

DOI: 10.1080/03081087.2020.1757602