Binary operation

Results: 61



#Item
1

SYSTEM V APPLICATION BINARY INTERFACE Edition 4.1 Copyright  1990−1996 The Santa Cruz Operation, Inc. All rights reserved.

Add to Reading List

Source URL: refspecs.linuxbase.org

- Date: 2015-01-28 11:44:48
    2Logical connectives / Binary arithmetic / Mathematics / Computer architecture / Boolean algebra / Semantics / Logic / Central processing unit / Logical shift / Logical conjunction / Bitwise operation / Logical disjunction

    Bonus slides §  These are extra slides that used to be included in lecture notes, but have been moved to this, the “bonus” area to serve as a supplement.

    Add to Reading List

    Source URL: www-inst.eecs.berkeley.edu

    Language: English - Date: 2014-02-04 15:27:49
    3Computer architecture / Computing / X86 instructions / Binary arithmetic / Computer engineering / Central processing unit / Computer arithmetic / Instruction set / Streaming SIMD Extensions / Bitwise operation / Bit manipulation / SSSE3

    Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets Diego F. Aranha Department of Computer Science University of Bras´ılia Joint work with

    Add to Reading List

    Source URL: caramba.loria.fr

    Language: English
    4

    CSc 220: Algorithms Homework 4 Solutions Problem 1: Consider a binary heap of n elements stored in an array. Write an algorithm that deletes an element at index k where 1 ≤ k ≤ n. The operation should maintain the he

    Add to Reading List

    Source URL: www-cs.ccny.cuny.edu

    Language: English - Date: 2015-10-18 01:58:11
      5

      REGULARIZATION BY FREE ADDITIVE CONVOLUTION, SQUARE AND RECTANGULAR CASES SERBAN BELINSCHI, FLORENT BENAYCH-GEORGES AND ALICE GUIONNET Abstract. The free convolution  is the binary operation on the set of probability me

      Add to Reading List

      Source URL: www.umpa.ens-lyon.fr

      Language: English - Date: 2008-06-30 11:33:38
        6Abstract algebra / Algebra / Mathematics / Modular arithmetic / Computer arithmetic / Binary operations / E-commerce / RSA / Modular exponentiation / Montgomery modular multiplication / Vienna U-Bahn / Modulo operation

        A Timing Attack against RSA with the Chinese Remainder Theorem Werner Schindler Bundesamt f¨ ur Sicherheit in der Informationstechnik (BSI) Godesberger Allee 183, 53175 Bonn, Germany

        Add to Reading List

        Source URL: tls.mbed.org

        Language: English
        7

        The 62nd William Lowell Putnam Mathematical Competition Saturday, December 1, 2001 A–1 Consider a set S and a binary operation ∗, i.e., for each a, b ∈ S, a ∗ b ∈ S. Assume (a ∗ b) ∗ a = b for all a, b ∈

        Add to Reading List

        Source URL: kskedlaya.org

        Language: English - Date: 2014-01-16 17:22:58
          8Logic in computer science / Digital electronics / Hardware verification languages / E / Binary arithmetic / 3D computer graphics / Bitwise operation / Integer / ALGOL 68 / Computing / Theoretical computer science / Software engineering

          Chisel 2.2 Tutorial Jonathan Bachrach, Krste Asanovi´c, John Wawrzynek EECS Department, UC Berkeley {jrb|krste|johnw}@eecs.berkeley.edu July 10, 2015

          Add to Reading List

          Source URL: chisel.eecs.berkeley.edu

          Language: English - Date: 2015-07-10 18:48:11
          9Finite groups / Sylow theorems / Index of a subgroup / Normal subgroup / P-group / Abelian group / Quotient group / Group / Coset / Abstract algebra / Algebra / Group theory

          Groups Groups and subgroups Definitions A group G is a set equipped with an associative binary operation, an identity element for this operation, and which has inverses. A subgroup H ≤ G is a subset closed under the gr

          Add to Reading List

          Source URL: www.jchl.co.uk

          Language: English - Date: 2001-10-24 15:32:37
          10Steganography / Category theory / Structure / Statistical theory / Embedding / Jessica Fridrich / Entropy / Mathematics / Topology / Information theory

          MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY Tomáš Filler and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA {tomas.filler, fridrich}@binghamton.edu ABSTRA

          Add to Reading List

          Source URL: www.ws.binghamton.edu

          Language: English - Date: 2010-09-13 08:36:16
          UPDATE