Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Horner's method
Known as:
Horner's rule
, Horner's algorithm
, Horner rule
Expand
In mathematics, Horner's method (also known as Horner scheme in the UK or Horner's rule in the U.S.) is either of two things: * an algorithm for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
Algorithm
Arithmetic shift
B-spline
Binary multiplier
Expand
Broader (1)
Numerical analysis
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Maximum power point tracking method for PV array under partially shaded condition
Young-Hyok Ji
,
Doo-yong Jung
,
C. Won
,
Byoung-Kuk Lee
,
Jin-Wook Kim
IEEE Energy Conversion Congress and Exposition
2009
Corpus ID: 17247777
Conventional popular MPPT methods are effective under uniform solar irradiance. However, under partially shaded conditions, these…
Expand
Highly Cited
2009
Highly Cited
2009
Fusion Splicing Holey Fibers and Single-Mode Fibers: A Simple Method to Reduce Loss and Increase Strength
M. Tse
,
H. Tam
,
+4 authors
Ping-kong Alexander Wai
IEEE Photonics Technology Letters
2009
Corpus ID: 21042635
We demonstrate a novel method for low-loss splicing Ge-doped holey fibers (HF) with subwavelength core size and high numerical…
Expand
Highly Cited
2009
Highly Cited
2009
Quality based rank-level fusion in multibiometric systems
A. Abaza
,
A. Ross
IEEE 3rd International Conference on Biometrics…
2009
Corpus ID: 13134204
Multibiometric systems fuse evidences from multiple biometric sources typically resulting in better recognition accuracy. These…
Expand
Highly Cited
2007
Highly Cited
2007
Sol-gel modified Pechini method for obtaining nanocrystalline KRE(WO4)2 (RE = Gd and Yb)
M. Galcerán
,
M. Pujol
,
M. Aguiló
,
F. Díaz
2007
Corpus ID: 62892958
KRE(WO4)2 (RE = Gd and Yb) nanocrystalline powder was obtained by the modified sol-gel Pechini method. The precursor powder was…
Expand
Highly Cited
2005
Highly Cited
2005
Adapting Density Attacks to Low-Weight Knapsacks
Phong Q. Nguyen
,
J. Stern
International Conference on the Theory and…
2005
Corpus ID: 586135
Cryptosystems based on the knapsack problem were among the first public-key systems to be invented. Their high encryption…
Expand
Highly Cited
2001
Highly Cited
2001
An adaptive grid non-parametric approach to pharmacokinetic and dynamic (PK/PD) population models
R. Leary
,
R. Jelliffe
,
A. Schumitzky
,
M. Guilder
Proceedings 14th IEEE Symposium on Computer-Based…
2001
Corpus ID: 18929107
Our NPEM (Non-Parametric Expectation Maximization) software for non-parametric PK/PD (pharmacokinetic/pharmacodynamic) population…
Expand
Highly Cited
1989
Highly Cited
1989
Derivation of Stability Limits Using Analytical Sensitivity of the Transient Energy Margin
V. Vittal
,
E. Zhou
,
C. Hwang
,
A. Fouad
IEEE Power Engineering Review
1989
Corpus ID: 24639609
In recent years considerable progress has been achieved in power system transient stability assessment using the transient energy…
Expand
Highly Cited
1986
Highly Cited
1986
Pre-stack inversion of a 1-D medium
Pierre Kolb
,
F. Collino
,
P. Lailly
Proceedings of the IEEE
1986
Corpus ID: 42701517
Assuming a one-dimensional (1-D) acoustic medium and a known density, we want to determine the velocity distribution from pre…
Expand
Highly Cited
1986
Highly Cited
1986
Forecasting Data Published at Irregular Time Intervals Using an Extension of Holt's Method
D. Wright
1986
Corpus ID: 62612827
In practice many data series contain observations at irregular times whereas most forecasting methods are restricted to the case…
Expand
Highly Cited
1932
Highly Cited
1932
PHOSPHATASE STUDIES I. DETERMINATION OF INORGANIC PHOSPHATE. BEER'S LAW AND INTERFERING SUBSTANCES IN THE KUTTNER-LICHTENSTEIN METHOD
A. Bodansky
,
R. Bonoff
1932
Corpus ID: 82006056
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE