<--- Back to Details
First PageDocument Content
Mathematics / Exponentials / Mathematical analysis / Spreadsheet software / Spreadsheet / Recurrence relation / Logarithm / Exponentiation / Numbers / Chaos theory / Exponential growth / Equation
Date: 2000-03-05 23:58:04
Mathematics
Exponentials
Mathematical analysis
Spreadsheet software
Spreadsheet
Recurrence relation
Logarithm
Exponentiation
Numbers
Chaos theory
Exponential growth
Equation

Pictures of chaos from a spreadsheet Barry Kissane Murdoch University I have recently had the pleasure of reading a rather remarkable little book (Tuck & de Mestre, 1991) directed at the middle secondary years and based

Add to Reading List

Source URL: wwwstaff.murdoch.edu.au

Download Document from Source Website

File Size: 17,58 KB

Share Document on Facebook

Similar Documents

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin  Lev Pachmanov

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1xW2E - View Document

Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

DocID: 1vkME - View Document

Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

DocID: 1vkLm - View Document

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin  Lev Pachmanov

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1tEtV - View Document

EXPONENTIATION WITH ARBITRARY BASES, EXPONENTS MATH 152, SECTION 55 (VIPUL NAIK) Corresponding material in the book: Section 7.5. What students should definitely get: The definition of ab , where a > 0 and b is real. The

EXPONENTIATION WITH ARBITRARY BASES, EXPONENTS MATH 152, SECTION 55 (VIPUL NAIK) Corresponding material in the book: Section 7.5. What students should definitely get: The definition of ab , where a > 0 and b is real. The

DocID: 1sa3i - View Document