Reviewed pages
Jump to navigation
Jump to search
This lists contains reviewed pages whose highest attained review level (of a revision) is the specified level. A link is given to the latest revision of that level.
(first | last) View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)- Newton's method for systems of nonlinear equations, Numerical Recipes (133 bytes) (reviewed versions) [best revision]
- Newton's method for systems of nonlinear equations, Sundials (124 bytes) (reviewed versions) [best revision]
- Newton's method for systems of nonlinear equations, Numerical Mathematics - NewtonLib (149 bytes) (reviewed versions) [best revision]
- Newton's method for systems of nonlinear equations, PETSc (121 bytes) (reviewed versions) [best revision]
- Newton's method for systems of nonlinear equations, parallel1 (125 bytes) (reviewed versions) [best revision]
- Newton's method for systems of nonlinear equations, parallel2 (125 bytes) (reviewed versions) [best revision]
- Newton's method for systems of nonlinear equations, parallel3 (125 bytes) (reviewed versions) [best revision]
- Numerical quadrature (cubature) rules on an interval (for a multidimensional cube), scalability (159 bytes) (reviewed versions) [best revision]
- Poisson equation, solving with DFT, locality (6,763 bytes) (reviewed versions) [best revision]
- Poisson equation, solving with DFT, scalability (2,604 bytes) (reviewed versions) [best revision]
- Poisson equation, solving with DFT, FFTW (882 bytes) (reviewed versions) [best revision]
- Poisson equation, solving with DFT, FFTE (898 bytes) (reviewed versions) [best revision]
- Poisson equation, solving with DFT, P3DFFT (890 bytes) (reviewed versions) [best revision]
- Poisson equation, solving with DFT, cuFFT (897 bytes) (reviewed versions) [best revision]
- Poisson equation, solving with DFT, AccFFT (908 bytes) (reviewed versions) [best revision]
- Poisson equation, solving with DFT, MKL FFT (902 bytes) (reviewed versions) [best revision]
- Poisson equation, solving with DFT, PFFT (918 bytes) (reviewed versions) [best revision]
- Meet-in-the-middle attack, scalability (102 bytes) (reviewed versions) [best revision]
- Meet-in-the-middle attack, implementation1 (106 bytes) (reviewed versions) [best revision]
- Meet-in-the-middle attack, implementation2 (106 bytes) (reviewed versions) [best revision]
- Meet-in-the-middle attack, implementation3 (106 bytes) (reviewed versions) [best revision]