<--- Back to Details
First PageDocument Content
Lambda calculus / Subroutines / Recursion / Theoretical computer science / Computability theory / Lambda lifting / Fold / Closure / Scheme / Software engineering / Computing / Computer programming
Date: 1999-09-23 18:42:18
Lambda calculus
Subroutines
Recursion
Theoretical computer science
Computability theory
Lambda lifting
Fold
Closure
Scheme
Software engineering
Computing
Computer programming

BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Download Document from Source Website

File Size: 356,63 KB

Share Document on Facebook

Similar Documents

Cryptography / Multivariate cryptography / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / QUAD / Quadratic form / Digital signature / Quadratic function / XSL attack

HMFEv - An Efficient Multivariate Signature Scheme Albrecht Petzoldt1(B) , Ming-Shing Chen2 , Jintai Ding3 , and Bo-Yin Yang2 1 National Institute for Standards and Technology, Gaithersburg, MD, USA

DocID: 1xVxV - View Document

Software engineering / Computer programming / Computing / Programming languages / Object-oriented programming languages / Functional programming / Procedural programming languages / Subroutines / Scheme / Parameter / Lisp / Anonymous function

Keyword and Optional Arguments in PLT Scheme Matthew Flatt Eli Barzilay University of Utah and PLT

DocID: 1xVfP - View Document

Cryptography / Multivariate cryptography / Equations / Post-quantum cryptography / Quadratic / RSA / QUAD / Algebraic geometry / Algebraic equation / Elliptic Curve Digital Signature Algorithm / Polynomial

A More Secure and Efficacious TTS Signature Scheme   Jiun-Ming Chen and Bo-Yin Yang

DocID: 1xV6f - View Document

Finance / Money / Economy / Funds / Investment / SICAV / Specialized investment fund / Umbrella fund / Investment fund

NET ASSET VALUE (€) - LOCALLY-BASED COLLECTIVE INVESTMENT SCHEMES JUNE 2015 Scheme Name Sub-Fund Name

DocID: 1xUOy - View Document

Quantum information science / Theoretical computer science / Quantum mechanics / Quantum cryptography / Cryptography / Quantum computing / BB84 / Qubit / Quantum key distribution / Quantum information / Controlled NOT gate / Quantum money

Lecture 8, Thurs Feb 9: More on Quantum Money, BB84 QKD Guest Lecture by Supartha Podder Continuation of Quantum Money Last time we discussed how classical money is copyable and described a scheme for making money uncopy

DocID: 1xUoL - View Document