About the Project

[Site: hs-geeks.com/instafr/],Comment Hack instagram methode septembre, pirater un compte instagram dark web, pourquoi pirater compte instagram, comment se faire pirater son compte instagram, instagram pirater que faire, Comment Hack compte instagram dark web, Comment Hack compte instagram, comment savoir qui a essay� de pirater mon compte instagram

AdvancedHelp

Did you mean [Site: hs-gcn.com/instal/],Comment jack instal methode septembe, porter un compte instal dark web, kouri porter compte instal, comment se faire porter son compte instal, instal porter queen faire, Comment jack compte instal dark web, Comment jack compte instal, comment avoid qui a essay� de porter mont compte instal ?

(0.008 seconds)

1—10 of 990 matching pages

1: Customize DLMF
…You can customize the appearance and functionality of the DLMF site using these selections. …
2: Bibliography T
  • P. G. Todorov (1978) Une nouvelle représentation explicite des nombres d’Euler. C. R. Acad. Sci. Paris Sér. A-B 286 (19), pp. A807–A809.
  • J. F. Traub (1964) Iterative Methods for the Solution of Equations. Prentice-Hall Series in Automatic Computation, Prentice-Hall Inc., Englewood Cliffs, N.J..
  • A. Trellakis, A. T. Galick, and U. Ravaioli (1997) Rational Chebyshev approximation for the Fermi-Dirac integral F 3 / 2 ( x ) . Solid–State Electronics 41 (5), pp. 771–773.
  • M. J. Tretter and G. W. Walster (1980) Further comments on the computation of modified Bessel function ratios. Math. Comp. 35 (151), pp. 937–939.
  • F. G. Tricomi (1949) Sul comportamento asintotico dell’ n -esimo polinomio di Laguerre nell’intorno dell’ascissa 4 n . Comment. Math. Helv. 22, pp. 150–167.
  • 3: DLMF Project News
    error generating summary
    4: How to Cite
    When citing DLMF from a formal publication, we suggest a format similar to the following: …If you mention a specific equation (or chapter, section, …), you’ll help your readers find it by using our Permalinks & Reference numbers. For example, the sentence in the  source: … Citations from other electronic media (the web, email, …), should, of course, use the appropriate means to give the site URL (https://dlmf.nist.gov/), or specific Permalinks. … For convenience, the permalink can be found in the pop-up ‘Info box’ associated with each item in the site.
    5: Bibliography K
  • A. D. Kerr (1978) An indirect method for evaluating certain infinite integrals. Z. Angew. Math. Phys. 29 (3), pp. 380–386.
  • Y. Kivshar and B. Luther-Davies (1998) Dark optical solitons: Physics and applications. Physics Reports 298 (2-3), pp. 81–197.
  • D. A. Kofke (2004) Comment on “The incomplete beta function law for parallel tempering sampling of classical canonical systems” [J. Chem. Phys. 120, 4119 (2004)]. J. Chem. Phys. 121 (2), pp. 1167.
  • S. Kowalevski (1889) Sur le problème de la rotation d’un corps solide autour d’un point fixe. Acta Math. 12 (1), pp. 177–232 (French).
  • V. I. Krylov and N. S. Skoblya (1985) A Handbook of Methods of Approximate Fourier Transformation and Inversion of the Laplace Transformation. Mir, Moscow.
  • 6: 6 Exponential, Logarithmic, Sine, and
    Cosine Integrals
    7: 7 Error Functions, Dawson’s and Fresnel Integrals
    8: 14.32 Methods of Computation
    §14.32 Methods of Computation
    Essentially the same comments that are made in §15.19 concerning the computation of hypergeometric functions apply to the functions described in the present chapter. In particular, for small or moderate values of the parameters μ and ν the power-series expansions of the various hypergeometric function representations given in §§14.3(i)14.3(iii), 14.19(ii), and 14.20(i) can be selected in such a way that convergence is stable, and reasonably rapid, especially when the argument of the functions is real. In other cases recurrence relations (§14.10) provide a powerful method when applied in a stable direction (§3.6); see Olver and Smith (1983) and Gautschi (1967). Other methods include: …
    9: 7.22 Methods of Computation
    §7.22 Methods of Computation
    The methods available for computing the main functions in this chapter are analogous to those described in §§6.18(i)6.18(iv) for the exponential integral and sine and cosine integrals, and similar comments apply. … For a comprehensive survey of computational methods for the functions treated in this chapter, see van der Laan and Temme (1984, Ch. V).
    10: Bibliography S
  • J. Segura (1998) A global Newton method for the zeros of cylinder functions. Numer. Algorithms 18 (3-4), pp. 259–276.
  • R. Sips (1967) Répartition du courant alternatif dans un conducteur cylindrique de section elliptique. Acad. Roy. Belg. Bull. Cl. Sci. (5) 53 (8), pp. 861–878.
  • I. Sh. Slavutskiĭ (1999) About von Staudt congruences for Bernoulli numbers. Comment. Math. Univ. St. Paul. 48 (2), pp. 137–144.
  • D. Slepian (1983) Some comments on Fourier analysis, uncertainty and modeling. SIAM Rev. 25 (3), pp. 379–393.
  • O. Szász (1950) On the relative extrema of ultraspherical polynomials. Boll. Un. Mat. Ital. (3) 5, pp. 125–127.