Journal articles on the topic 'CDC Cyber 205 computer'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 23 journal articles for your research on the topic 'CDC Cyber 205 computer.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Noor, Ahmed K., and Jeanne M. Peters. "Element stiffness computation on CDC CYBER 205 computer." Communications in Applied Numerical Methods 2, no. 3 (1986): 317–28. http://dx.doi.org/10.1002/cnm.1630020314.
Full textKennedy, A. D., J. Kuti, S. Meyer, and B. J. Pendleton. "Program for efficient Monte Carlo computations of quenched SU(3) lattice gauge theory using the Quasi-heatbath method on a CDC CYBER 205 computer." Journal of Computational Physics 64, no. 1 (1986): 133–60. http://dx.doi.org/10.1016/0021-9991(86)90022-7.
Full textStringer, James C., L. Kent Thomas, and Ray G. Pierson. "Efficiency of D4 Gaussian Elimination on a Vector Computer." Society of Petroleum Engineers Journal 25, no. 01 (1985): 121–24. http://dx.doi.org/10.2118/11082-pa.
Full textBarkai, D., and K. J. M. Moriarty. "Applications development on the CDC CYBER 205." Computer Physics Communications 40, no. 2-3 (1986): 159–71. http://dx.doi.org/10.1016/0010-4655(86)90105-0.
Full textLouter-Nool, Margreet. "Basic linear algebra subprograms (BLAS) on the CDC CYBER 205." Parallel Computing 4, no. 2 (1987): 143–65. http://dx.doi.org/10.1016/0167-8191(87)90048-2.
Full textAbu-Shumays, I. K. "Vectorization of Transport and Diffusion Computations on the CDC Cyber 205." Nuclear Science and Engineering 92, no. 1 (1986): 4–19. http://dx.doi.org/10.13182/nse86-a17859.
Full textRauk, Arvi, and Remo Dutler. "Implementation and applications of Gaussian 82 on a CDC Cyber 205." Journal of Computational Chemistry 8, no. 4 (1987): 324–32. http://dx.doi.org/10.1002/jcc.540080408.
Full textCreutz, Michael, K. J. M. Moriarty, and M. O'Brien. "Vectorization of the three-dimensional ISING model program on the CDC cyber 205." Computer Physics Communications 42, no. 2 (1986): 191–96. http://dx.doi.org/10.1016/0010-4655(86)90036-6.
Full textShu Wong, Yau. "Solving large elliptic difference equations on CYBER 205." Parallel Computing 6, no. 2 (1988): 195–207. http://dx.doi.org/10.1016/0167-8191(88)90084-1.
Full textBrode, Stefan, and Reinhart Ahlrichs. "An optimized MD program for the vector computer cyber 205." Computer Physics Communications 42, no. 1 (1986): 51–57. http://dx.doi.org/10.1016/0010-4655(86)90230-4.
Full textSong, J. L., R. A. Pielke, and M. Segal. "Vectorizing a mesoscale meteorological model on the cyber 205." Environmental Software 1, no. 1 (1986): 10–16. http://dx.doi.org/10.1016/0266-9838(86)90031-6.
Full textBhanot, Gyan, Román Salvador, Dennis Duke, and K. J. M. Moriarty. "A fast vectorized program for the CDC cyber 205 to simulate the ising spin glass in three dimensions." Computer Physics Communications 49, no. 3 (1988): 465–74. http://dx.doi.org/10.1016/0010-4655(88)90007-0.
Full textRizzi, Arthur. "Vector coding the finite-volume procedure for the CYBER 205." Parallel Computing 2, no. 4 (1985): 295–312. http://dx.doi.org/10.1016/0167-8191(85)90029-8.
Full textFlassak, Th, and N. Moussiopoulos. "Direct solution of the Helmholtz equation using fourier analysis on the cyber 205." Environmental Software 3, no. 1 (1988): 12–16. http://dx.doi.org/10.1016/0266-9838(88)90004-4.
Full textTolsma, L. D. "Solving large sets of coupled equations iteratively by vector processing on the cyber 205 computer." Computer Physics Communications 37, no. 1-3 (1985): 245–49. http://dx.doi.org/10.1016/0010-4655(85)90159-6.
Full textZvozdetska, Oksana. "NATO’s new strategic concept in cybersecurity issues in the context of up-to-the date vulnerability and threat information." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 71–93. http://dx.doi.org/10.31861/mediaforum.2018.6.71-93.
Full textRizzi, Arthur, and Charles J. Purcell. "Large CYBER 205 model of the Euler equations for vortex‐stretched turbulent flow around delta wings." Engineering Computations 2, no. 1 (1985): 63–70. http://dx.doi.org/10.1108/eb023602.
Full textHoheisel, C., R. Vogelsang, and M. Schoen. "Comparison of the Singer method and the constraints method for molecular dynamics with linear molecules on the vector computer CYBER 205." Computer Physics Communications 43, no. 2 (1987): 217–29. http://dx.doi.org/10.1016/0010-4655(87)90207-4.
Full textMakino, Junichiro. "Treecode with a Special-Purpose Processor." Publications of the Astronomical Society of Japan 43, no. 4 (1991): 621–38. https://doi.org/10.1093/pasj/43.4.621.
Full textTelste, J. G., and F. Noblesse. "Numerical Evaluation of the Green Function of Water-Wave Radiation and Diffraction." Journal of Ship Research 30, no. 02 (1986): 69–84. http://dx.doi.org/10.5957/jsr.1986.30.2.69.
Full textVogelsang, R., and C. Hoheisel. "A Monte Carlo FORTRAN 200 programme for the determination of static properties of liquids vectorized to run on the CYBER 205 vector processing computer." Computer Physics Communications 46, no. 2 (1987): 209–16. http://dx.doi.org/10.1016/0010-4655(87)90002-6.
Full textHampton, Clark, Steve G. Sutton, Vicky Arnold, and Deepak Khazanchi. "CYBER SUPPLY CHAIN RISK MANAGEMENT: TOWARD AN UNDERSTANDING OF THE ANTECEDENTS TO DEMAND FOR ASSURANCE." Journal of Information Systems, October 7, 2020. http://dx.doi.org/10.2308/isys-19-050.
Full textBurns, Alex. "Oblique Strategies for Ambient Journalism." M/C Journal 13, no. 2 (2010). http://dx.doi.org/10.5204/mcj.230.
Full text