Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Brent's method

Known as: Brents method, Van Wijngaarden-Dekker-Brent method, Brent method 
In numerical analysis, Brent's method is a root-finding algorithm combining the bisection method, the secant method and inverse quadratic… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Noninteractive zero-knowledge proofs and noninteractive witness-indistinguishable proofs have played a significant role in the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The design of adders on quantum dot cellular automata (QCA) has been of recent interest. While few designs exist, investigations… Expand
  • figure 1
  • figure 5
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Moving from a neoliberal ideological testing ground to part of the purported new wave of Latin American socialism, the current… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
  • M. Chase, S. Chow
  • ACM Conference on Computer and Communications…
  • 2009
  • Corpus ID: 207176675
Attribute based encryption (ABE) [13] determines decryption ability based on a user's attributes. In a multi-authority ABE scheme… Expand
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
SummaryConvergence-confinement analysis for tunneling is a standard approach for preliminary analysis of anticipated wall… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Abstract As the literature on trail development suggests, recreational trail projects can generate conflicts and controversies… Expand
  • figure 1
  • figure 2.1
  • figure 2.2
  • figure 4
  • figure 5
Is this relevant?
2008
2008
This paper presents application of Brent method to solve dynamic economic dispatch (DED) problem with transmission losses. The… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
This paper describes the first identity-based broadcast encryption scheme (IBBE) with constant size ciphertexts and private keys… Expand
Is this relevant?
2006
2006
Actual predation is rarely observed in the field, and therefore the role of predators is often severely underestimated. Species… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
Is this relevant?
2000
2000
  • Kelso Marsden Lane
  • 2000
  • Corpus ID: 30496419
If Bork is correct then there is scant time for school leaders to waste in implementing strategies to ensure its effective use as… Expand
  • table 1
  • table 2
Is this relevant?