Verified computation of matrix gamma function
نویسندگان
چکیده
منابع مشابه
Verified Computation of Square Roots of a Matrix
We present methods to compute verified square roots of a square matrix A. Given an approximation X to the square root, obtained by a classical floating point algorithm, we use interval arithmetic to find an interval matrix which is guaranteed to contain the error of X. Our approach is based on the Krawczyk method which we modify in two different ways in such a manner that the computational comp...
متن کاملVerified Computation with Probabilities
Because machine calculations are prone to errors that can sometimes accumulate disastrously, computer scientists use special strategies called verified computation to ensure output is reliable. Such strategies are needed for computing with probability distributions. In probabilistic calculations, analysts have routinely assumed (i) probabilities and probability distributions are precisely speci...
متن کاملVerified Computation of High-Order Poincaré Maps
Poincaré maps often prove to be invaluable tools in the study of long-term behaviour and qualitative properties of a given dynamical system. While the analytic theory of these maps is fully explored, finding numerical algorithms that allow the computation of Poincaré maps in concrete problems is far from trivial. For the verification it is desirable to approximate the Poincaré map over as large...
متن کاملFast verified computation for the solvent of the quadratic matrix equation
Two fast algorithms for numerically computing an interval matrix containing the solvent of the quadratic matrix equation AX2+BX+C = 0 with square matrices A, B, C and X are proposed. These algorithms require only cubic complexity, verify the uniqueness of the contained solvent, and do not involve iterative process. Let X̃ be a numerical approximation to the solvent. The first and second algorith...
متن کاملVerified Implementations for Secure and Verifiable Computation
Formal verification of the security of software systems is gradually moving from the traditional focus on idealized models, to the more ambitious goal of producing verified implementations. This trend is also present in recent work targeting the verification of cryptographic software, but the reach of existing tools has so far been limited to cryptographic primitives, such as RSA-OAEP encryptio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Linear and Multilinear Algebra
سال: 2020
ISSN: 0308-1087,1563-5139
DOI: 10.1080/03081087.2020.1757602