Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,851,245 papers from all fields of science
Search
Sign In
Create Free Account
Horner's method
Known as:
Horner's rule
, Horner's algorithm
, Horner rule
Expand
In mathematics, Horner's method (also known as Horner scheme in the UK or Horner's rule in the U.S.) is either of two things: * an algorithm for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
Algorithm
Arithmetic shift
B-spline
Binary multiplier
Expand
Broader (1)
Numerical analysis
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Quantification of large uncertainties in fossil leaf paleoaltimetry
D. Peppe
,
D. Royer
,
P. Wilf
,
Elizabeth A. Kowalski
2010
Corpus ID: 17096780
Estimates of paleoelevation potentially constrain geodynamic models of continental deformation and inform interpretations of…
Expand
Highly Cited
2008
Highly Cited
2008
A MOMENT METHOD SIMULATION OF ELECTROMAGNETIC SCATTERING FROM CONDUCTING BODIES
Saeed Hatamzadeh-Varmazyar
,
M. Naser‐Moghadasi
,
Z. Masouri
2008
Corpus ID: 121861616
In this paper a moment method simulation of electromag- netic scattering problem is presented. An effective numerical method for…
Expand
2008
2008
Hybrid Temporal Error Concealment Methods for Block-Based Compressed Video Transmission
Min-Cheol Hwang
,
Jun-Hyung Kim
,
D. Duong
,
Sung-Jea Ko
IEEE transactions on broadcasting
2008
Corpus ID: 206605662
Boundary matching algorithm (BMA) and decoder motion vector estimation (DMVE) are two well-known temporal error concealment…
Expand
2005
2005
Error measurements for flank milling
Chenggang Li
,
Stephen Mann
,
S. Bedi
Comput. Aided Des.
2005
Corpus ID: 7274592
Highly Cited
2005
Highly Cited
2005
Adapting Density Attacks to Low-Weight Knapsacks
Phong Q. Nguyen
,
J. Stern
International Conference on the Theory and…
2005
Corpus ID: 586135
Cryptosystems based on the knapsack problem were among the first public-key systems to be invented. Their high encryption…
Expand
Highly Cited
2001
Highly Cited
2001
An adaptive grid non-parametric approach to pharmacokinetic and dynamic (PK/PD) population models
R. Leary
,
R. Jelliffe
,
A. Schumitzky
,
M. Guilder
Proceedings 14th IEEE Symposium on Computer-Based…
2001
Corpus ID: 18929107
Our NPEM (Non-Parametric Expectation Maximization) software for non-parametric PK/PD (pharmacokinetic/pharmacodynamic) population…
Expand
Highly Cited
1997
Highly Cited
1997
VLSI array algorithms and architectures for RSA modular multiplication
Y. Jeong
,
W. Burleson
IEEE Transactions on Very Large Scale Integration…
1997
Corpus ID: 36721067
We present two novel iterative algorithms and their array structures for integer modular multiplication. The algorithms are…
Expand
Highly Cited
1986
Highly Cited
1986
Pre-stack inversion of a 1-D medium
Pierre Kolb
,
F. Collino
,
P. Lailly
Proceedings of the IEEE
1986
Corpus ID: 42701517
Assuming a one-dimensional (1-D) acoustic medium and a known density, we want to determine the velocity distribution from pre…
Expand
Review
1969
Review
1969
A Review of Browse in the Nutrition of Grazing Animals (Revision Bibliografica de los Arbustos en la Nutricion de los Animales en Pastoreo)
A. D. Wilson
1969
Corpus ID: 56261995
Forb populations on the sites were floristically diverse. Characteristic or indicator forbs included resinous skullcap, black…
Expand
Highly Cited
1932
Highly Cited
1932
PHOSPHATASE STUDIES I. DETERMINATION OF INORGANIC PHOSPHATE. BEER'S LAW AND INTERFERING SUBSTANCES IN THE KUTTNER-LICHTENSTEIN METHOD
A. Bodansky
,
R. Bonoff
1932
Corpus ID: 82006056
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE