Search
Now showing items 1-6 of 6
Reverse differentiation and the inverse diffusion problem
(1997-06)
In this paper the task of solving the inverse photon diffusion problem in human tissue will be discussed. In such problems the optical properties of the tissue are to be determined from a knowledge of measured values of ...
A superscalar architecture to exploit instruction level parallelism
(1997-03-17)
If a high-performance superscalar processor is to realise its full potential, the compiler must re-order or schedule the object code at compile time. This scheduling creates groups of adjacent instructions that are independent ...
Giving reverse differentiation a helping hand
(1997)
Reverse automatic differentiation provides a very low bound on the operations count for calculating a gradient of a scalar function in n dimensions but suffers from a high storage requirement. In this paper we will show ...
Automatic differentiation of computer programs in a parallel computing environment
(Computational Mechanics, 1997)
This paper gives an introduction to a number of methods collectively known as Automatic Differentiation (AD). AD is the systematic application of the rules of calculus to computer programs yielding, as output, programs ...
Binding bit patterns to real world entities
(University of Hertfordshire, 1997)
Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principles who are authorized to ...
Why isn't trust transitive?
(1997)
One of the great strengths of public-key cryptography is its potential to allow the localization of trust. This potential is greatest when cryptography is present to guarantee data integrity rather than secrecy, and where ...