DynDNS

Results: 399



#Item
21Compiler optimizations / Numerical analysis

Introduction to Numerical Analysis, Spring 2013 Midterm 1 March 19, 2013 This exam starts at 2:35 PM. This exam ends at 3:55 PM. This exam is closed-book. No notes, no textbooks, no calculators, no electronic devi

Add to Reading List

Source URL: homerreid.dyndns.org

Language: English - Date: 2016-03-11 03:12:58
22RungeKutta methods / Midpoint method

Introduction to Numerical Analysis Spring 2016 Problem Set 3 Solutions Homer Reid February 25, 2016 Problem 1. (a) To evaluate

Add to Reading List

Source URL: homerreid.dyndns.org

Language: English - Date: 2016-02-25 23:38:45
23

Lecture Notes: Fourier Analysis Homer Reid April 8, 2014 Contents

Add to Reading List

Source URL: homerreid.dyndns.org

Language: English - Date: 2015-10-27 00:54:43
    24Mathematical analysis / Fourier analysis / Joseph Fourier / Integral transforms / Mathematical physics / Generalized functions / Fourier transform / Error function / Ewald summation / Poisson summation formula / Series / Fourier series

    Lecture Notes: Ewald Summation Homer Reid April 10,

    Add to Reading List

    Source URL: homerreid.dyndns.org

    Language: English - Date: 2015-10-27 00:54:41
    25

    Black-box Property of Cryptographic Hash Functions Michal Rjaˇsko Comenius University in Bratislava Faculty of Mathematics, Physics and Informatics Department of Computer Science

    Add to Reading List

    Source URL: fps2011.dyndns.org

    Language: English
      26

      Bell Labs France ECT Security Research Department SECURITY IN OPPORTUNISTIC

      Add to Reading List

      Source URL: fps2011.dyndns.org

      Language: English
        27

        “Security Issues in Hierarchical OLSR networks” by Gimer Cervera 4th Canada-France MITACS Workshop on

        Add to Reading List

        Source URL: fps2011.dyndns.org

        Language: English
          28

          TTP SmartCard-based ElGamal Cryptosystem using Threshold Scheme for Electronic Elections Authors: Jordi Pujol-Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca UNESCO Chair in Data Privacy

          Add to Reading List

          Source URL: fps2011.dyndns.org

          Language: English
            29

            A Novel Commutative Blinding Identity Based Encryption Scheme Yu Chen Song Luo

            Add to Reading List

            Source URL: fps2011.dyndns.org

            Language: English
              30

              Threshold Encryption into Multiple Ciphertexts Martin Stanek Department of Computer Science Comenius University

              Add to Reading List

              Source URL: fps2011.dyndns.org

              Language: English
                UPDATE