Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Brent's method

Known as: Brents method, Van Wijngaarden-Dekker-Brent method, Brent method 
In numerical analysis, Brent's method is a root-finding algorithm combining the bisection method, the secant method and inverse quadratic… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
  • H. Vejdani, J. Hurst
  • IEEE International Conference on Robotics and…
  • 2013
  • Corpus ID: 13404876
The passive dynamics of actuators may impose serious limitations to the performance of a system. Existence of inertia for example… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2012
Highly Cited
2012
Noninteractive zero-knowledge proofs and noninteractive witness-indistinguishable proofs have played a significant role in the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2012
Highly Cited
2012
The design of adders on quantum dot cellular automata (QCA) has been of recent interest. While few designs exist, investigations… Expand
  • figure 1
  • figure 5
  • figure 3
  • figure 4
  • figure 6
Highly Cited
2010
Highly Cited
2010
Moving from a neoliberal ideological testing ground to part of the purported new wave of Latin American socialism, the current… Expand
Highly Cited
2009
Highly Cited
2009
Attribute based encryption (ABE) [13] determines decryption ability based on a user's attributes. In a multi-authority ABE scheme… Expand
  • figure 1
  • table 1
Highly Cited
2009
Highly Cited
2009
SummaryConvergence-confinement analysis for tunneling is a standard approach for preliminary analysis of anticipated wall… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2008
Highly Cited
2008
Abstract As the literature on trail development suggests, recreational trail projects can generate conflicts and controversies… Expand
  • figure 1
  • figure 2.1
  • figure 2.2
  • figure 4
  • figure 5
Highly Cited
2007
Highly Cited
2007
This paper describes the first identity-based broadcast encryption scheme (IBBE) with constant size ciphertexts and private keys… Expand
2006
2006
Actual predation is rarely observed in the field, and therefore the role of predators is often severely underestimated. Species… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
Highly Cited
1990
Highly Cited
1990
A parallel computing system becomes increasingly prone to failure as the number of processing elements in it increases. In this… Expand