Results 331 to 340 of about 369,824 (381)
Some of the next articles are maybe not open access.
Subsystems of second order arithmetic
Perspectives in Mathematical Logic, 1999List of tables Preface Acknowledgements 1. Introduction Part I. Development of Mathematics within Subsystems of Z2: 2. Recursive comprehension 3. Arithmetical comprehension 4. Weak Konig's lemma 5. Arithmetical transfinite recursion 6. pi11 comprehension
S. G. Simpson
semanticscholar +1 more source
Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard
IEEE Trans. Circuits Syst. Video Technol., 2003Context-based adaptive binary arithmetic coding (CABAC) as a normative part of the new ITU-T/ISO/IEC standard H.264/AVC for video compression is presented.
D. Marpe, T. Wiegand, H. Schwarz
semanticscholar +1 more source
What every computer scientist should know about floating-point arithmetic
CSUR, 1991Floating-point arithmetic is considered as esoteric subject by many people. This is rather surprising, because floating-point is ubiquitous in computer systems: Almost every language has a floating-point datatype; computers from PCs to supercomputers ...
David Goldberg
semanticscholar +1 more source
The arithmetic of cuts in models of arithmetic
Mathematical Logic Quarterly, 2013We present a number of results on the structure of initial segments of models of Peano arithmetic with the arithmetic operations of addition, subtraction, multiplication, division, exponentiation and logarithm. Each of the binary operations introduced is defined in two dual ways, often with quite different results, and we attempt to systematise the ...
openaire +2 more sources
Arithmetic Theory of Arithmetic Surfaces
The Annals of Mathematics, 1989is a proper smooth surface over a finite field F,. The primary purpose of this paper is to develop arithmetic theory of the Brauer group Br(K) of K. Here we have to assume that the ring J(X, (x) of the regular functions on X has no embedding into R. In general all results hold true modulo 2-torsion.
openaire +2 more sources
Interventional Neuroradiology, 1997
In the following note the basic principles of event data analysis and censored data will be explained. The concept of risk will be defined. The interaction of estimation and confidence interval will be discussed. We explain the estimator of risk and show how to use it for the calculation of probability statements.
openaire +3 more sources
In the following note the basic principles of event data analysis and censored data will be explained. The concept of risk will be defined. The interaction of estimation and confidence interval will be discussed. We explain the estimator of risk and show how to use it for the calculation of probability statements.
openaire +3 more sources
Homomorphic Encryption for Arithmetic of Approximate Numbers
International Conference on the Theory and Application of Cryptology and Information Security, 2017J. Cheon+3 more
semanticscholar +1 more source
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits
IACR Cryptology ePrint Archive, 2020Daniel E. Escudero+4 more
semanticscholar +1 more source
2004
AbstractIt has to be shown that the axioms of ZU guarantee the existence of structures with the familiar properties the natural, rational, and real numbers are expected to have. This chapter makes a start on this project by considering natural numbers.
openaire +1 more source
AbstractIt has to be shown that the axioms of ZU guarantee the existence of structures with the familiar properties the natural, rational, and real numbers are expected to have. This chapter makes a start on this project by considering natural numbers.
openaire +1 more source