Hidden transformation

Results: 15



#Item
1

Proceedings of the 11th Space Syntax Symposium #53 URBAN DIVERSITY AND TRANSFORMATION: Public housing and the ‘hidden morphology of plots’

Add to Reading List

Source URL: www.11ssslisbon.pt

Language: English - Date: 2017-09-10 09:35:15
    2Constraint programming / Constraint satisfaction / Constraint logic programming / Constrained optimization / Kaleidoscope / Decomposition method / Hidden transformation

    Checks and Balances - Constraint Solving without Surprises in Object-Constraint Programming Languages Tim Felgentreff, Todd Millstein, Alan Borning and Robert Hirschfeld

    Add to Reading List

    Source URL: www.vpri.org

    Language: English - Date: 2015-08-28 21:28:56
    3Computing / Local consistency / Backtracking / Search algorithm / Linear programming / Constraint satisfaction / Hidden transformation / Constraint programming / Software engineering / Computer programming

    Constraint Programming Emmanuel Hebrard Toulouse Outline

    Add to Reading List

    Source URL: homepages.laas.fr

    Language: English - Date: 2014-02-17 03:07:15
    4Algebra / Machine learning / Hidden Markov model / Speech recognition / Transformation matrix / Backpropagation / Affine transformation / Linear map / Artificial neural network / Transformation / Mathematics / Neural networks

    ADAPTATION OF CONTEXT-DEPENDENT DEEP NEURAL NETWORKS FOR AUTOMATIC SPEECH RECOGNITION Kaisheng Yao1 , Dong Yu2 , Frank Seide3 , Hang Su3,4 , Li Deng2 , and Yifan Gong1 1 Online Service Division, Microsoft Corporation, R

    Add to Reading List

    Source URL: wiki.inf.ed.ac.uk

    Language: English - Date: 2013-03-16 11:34:11
    5Post-quantum cryptography / Finite fields / Hidden Field Equations / Affine geometry / Affine transformation / Parity of a permutation / Abstract algebra / Geometry / Mathematics

    Equivalent Keys in HFE, C∗ , and variations Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven.ac.be or chris@

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-08-09 08:01:38
    6Hidden Field Equations / Unbalanced Oil and Vinegar / Affine transformation / Quadratic polynomial / Vector space / Polynomial / Multivariate cryptography / Algebraic geometry / Algebra / Mathematics / Post-quantum cryptography

    Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-01-28 03:37:27
    7Finite fields / Hidden Field Equations / Mathematics / Affine geometry / Affine transformation / Unbalanced Oil and Vinegar / Differential geometry / Multivariate cryptography / Frobenius group / Post-quantum cryptography / Geometry / Abstract algebra

    Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-12-22 06:53:55
    8Hidden Field Equations / Cryptography / Post-quantum cryptography / Public-key cryptography

    A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation Masao KASAHARA Faculty of Informatics, Osaka Gakuin University, Suita-shi, Japan. .

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-12-20 02:54:57
    9Educators / Teacher / Teaching

    Ms. Deepa Transformation into a Vedavallian “No one has yet realized the wealth of sympathy, the kindness and generosity hidden in the soul of a child. The effort of every true education should be to unlock that treasu

    Add to Reading List

    Source URL: vedavallividyalaya.org

    Language: English - Date: 2011-08-09 05:57:53
    10Computer programming / Constraint satisfaction problem / Local consistency / Hidden transformation / Constraint satisfaction / Constraint graph / Boolean satisfiability problem / Hidden variable / Backtracking / Constraint programming / Software engineering / Theoretical computer science

    Binary vs. Non-Binary Constraints Fahiem Bacchus Department of Computer Science University of Toronto Toronto, Canada [removed]

    Add to Reading List

    Source URL: www.cse.unsw.edu.au

    Language: English - Date: 2006-01-21 00:43:15
    UPDATE