

Author: Bremner David Chan Timothy Demaine Erik Erickson Jeff Hurtado Ferran Iacono John Langerman Stefan Ptraşcu Mihai Taslakian Perouz
Publisher: Springer Publishing Company
ISSN: 0178-4617
Source: Algorithmica, Vol.69, Iss.2, 2014-06, pp. : 294-314
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content








A new matrix approach to real FFTs and convolutions of length 2
Computing, Vol. 80, Iss. 1, 2007-05 ,pp. :