<--- Back to Details
First PageDocument Content
Transformation languages / Procedural programming languages / Source code / Dylan programming language / Hygienic macro / Scheme programming language / Scheme / Macro / C preprocessor / Software engineering / Computing / Computer programming
Date: 2004-05-14 18:17:15
Transformation languages
Procedural programming languages
Source code
Dylan programming language
Hygienic macro
Scheme programming language
Scheme
Macro
C preprocessor
Software engineering
Computing
Computer programming

Add to Reading List

Source URL: www.cs.indiana.edu

Download Document from Source Website

File Size: 205,35 KB

Share Document on Facebook

Similar Documents

Cryptography / Multivariate cryptography / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / QUAD / Quadratic form / Digital signature / Quadratic function / XSL attack

HMFEv - An Efficient Multivariate Signature Scheme Albrecht Petzoldt1(B) , Ming-Shing Chen2 , Jintai Ding3 , and Bo-Yin Yang2 1 National Institute for Standards and Technology, Gaithersburg, MD, USA

DocID: 1xVxV - View Document

Software engineering / Computer programming / Computing / Programming languages / Object-oriented programming languages / Functional programming / Procedural programming languages / Subroutines / Scheme / Parameter / Lisp / Anonymous function

Keyword and Optional Arguments in PLT Scheme Matthew Flatt Eli Barzilay University of Utah and PLT

DocID: 1xVfP - View Document

Cryptography / Multivariate cryptography / Equations / Post-quantum cryptography / Quadratic / RSA / QUAD / Algebraic geometry / Algebraic equation / Elliptic Curve Digital Signature Algorithm / Polynomial

A More Secure and Efficacious TTS Signature Scheme   Jiun-Ming Chen and Bo-Yin Yang

DocID: 1xV6f - View Document

Finance / Money / Economy / Funds / Investment / SICAV / Specialized investment fund / Umbrella fund / Investment fund

NET ASSET VALUE (€) - LOCALLY-BASED COLLECTIVE INVESTMENT SCHEMES JUNE 2015 Scheme Name Sub-Fund Name

DocID: 1xUOy - View Document

Quantum information science / Theoretical computer science / Quantum mechanics / Quantum cryptography / Cryptography / Quantum computing / BB84 / Qubit / Quantum key distribution / Quantum information / Controlled NOT gate / Quantum money

Lecture 8, Thurs Feb 9: More on Quantum Money, BB84 QKD Guest Lecture by Supartha Podder Continuation of Quantum Money Last time we discussed how classical money is copyable and described a scheme for making money uncopy

DocID: 1xUoL - View Document