<--- Back to Details
First PageDocument Content
Software engineering / Programming language theory / Lambda calculus / Computer programming / Scheme / Structure and Interpretation of Computer Programs / Anonymous function / Square root / Nth root
Date: 2005-09-12 12:47:00
Software engineering
Programming language theory
Lambda calculus
Computer programming
Scheme
Structure and Interpretation of Computer Programs
Anonymous function
Square root
Nth root

Microsoft PowerPoint - Lect02Scheme.ppt

Add to Reading List

Source URL: sicp.csail.mit.edu

Download Document from Source Website

File Size: 35,45 KB

Share Document on Facebook

Similar Documents

Cryptography / Multivariate cryptography / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / QUAD / Quadratic form / Digital signature / Quadratic function / XSL attack

HMFEv - An Efficient Multivariate Signature Scheme Albrecht Petzoldt1(B) , Ming-Shing Chen2 , Jintai Ding3 , and Bo-Yin Yang2 1 National Institute for Standards and Technology, Gaithersburg, MD, USA

DocID: 1xVxV - View Document

Software engineering / Computer programming / Computing / Programming languages / Object-oriented programming languages / Functional programming / Procedural programming languages / Subroutines / Scheme / Parameter / Lisp / Anonymous function

Keyword and Optional Arguments in PLT Scheme Matthew Flatt Eli Barzilay University of Utah and PLT

DocID: 1xVfP - View Document

Cryptography / Multivariate cryptography / Equations / Post-quantum cryptography / Quadratic / RSA / QUAD / Algebraic geometry / Algebraic equation / Elliptic Curve Digital Signature Algorithm / Polynomial

A More Secure and Efficacious TTS Signature Scheme   Jiun-Ming Chen and Bo-Yin Yang

DocID: 1xV6f - View Document

Finance / Money / Economy / Funds / Investment / SICAV / Specialized investment fund / Umbrella fund / Investment fund

NET ASSET VALUE (€) - LOCALLY-BASED COLLECTIVE INVESTMENT SCHEMES JUNE 2015 Scheme Name Sub-Fund Name

DocID: 1xUOy - View Document

Quantum information science / Theoretical computer science / Quantum mechanics / Quantum cryptography / Cryptography / Quantum computing / BB84 / Qubit / Quantum key distribution / Quantum information / Controlled NOT gate / Quantum money

Lecture 8, Thurs Feb 9: More on Quantum Money, BB84 QKD Guest Lecture by Supartha Podder Continuation of Quantum Money Last time we discussed how classical money is copyable and described a scheme for making money uncopy

DocID: 1xUoL - View Document