Work

Results: 156439



#Item
71Symbol

Better Answers to Real Questions Thomas Sturm, Joint Work with M. Košta and A. Dolzmann SMT 2014, Vienna, 18 Julyhttp://www.mpi-inf.mpg.de/~sturm/

Add to Reading List

Source URL: smt2014.it.uu.se

Language: English - Date: 2014-07-18 15:01:43
    72Search algorithms / Statistical randomness / Matrix / Probability distribution / Hash function / Bitcoin / Scrypt / Random variable / Information retrieval / Information science / Cryptography

    Tensority: an ASIC-friendly Proof of Work Algorithm Based on Tensor Bytom Foundation Email: April 17, 2018 Abstract

    Add to Reading List

    Source URL: bytom.io

    Language: English - Date: 2018-04-18 21:58:58
    73Information technology management / Management / Economy / Business / Web portal / Project management / Business process management / Project portfolio management / Collaborative workflow / Enterprise content management

    FACILITIES & PLANT MANAGEMENT WORK MANAGEMENT “

    Add to Reading List

    Source URL: www.teamdynamix.com

    Language: English
    74Abstract algebra / Algebra / Geometry / Algebraic geometry / Fano variety / Birational geometry / Divisor / Projective variety / Coherent sheaf / Hodge structure / Cohomology / Ample line bundle

    CURVES OF LOW DEGREES IN FANO VARIETIES OLIVIER DEBARRE Abstract. We work over the complex numbers. Fano manifolds are smooth projective varieties whose canonical bundle is antiample. In dimensions at most 3, they are al

    Add to Reading List

    Source URL: www.math.ens.fr

    Language: English - Date: 2014-06-03 17:41:05
    75Search algorithms / Information retrieval / Information science / Cryptography / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Hopf decomposition / Compound of twelve pentagonal antiprisms with rotational freedom

    Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:40
    76

    How Does Enjin Coin Work? A simple, step-by-step explanation of Enjin Coin (ENJ) utilisation in video games. Acquisition Game developers acquire

    Add to Reading List

    Source URL: prkit.co

    - Date: 2018-03-13 22:25:14
      77Computer science / Software engineering / AGH / Janusz Kacprzyk / Philip Wadler / Functional programming / Computing

      CALL FOR PAPERS - RESEARCH TRACK AGH and collaborating institutions invite you to submit your work to Lambda Days 2019 Research Track. After the conference the reviews will be finalized and accepted papers will appear as

      Add to Reading List

      Source URL: s3.amazonaws.com

      Language: English - Date: 2018-07-09 08:48:27
      78Assistive technology / Tile / Manycore processors

      Getting to Work with OpenPiton Princeton University http://openpiton.org OpenPit

      Add to Reading List

      Source URL: parallel.princeton.edu

      Language: English - Date: 2017-02-16 15:26:27
      79

      Pushing to the Top with K-induction Arie Gurfinkel Electrical and Computer Engineering University of Waterloo joint work with Alexander Ivrii (IBM)

      Add to Reading List

      Source URL: arieg.bitbucket.io

      Language: English - Date: 2018-10-19 18:15:18
        80Computer programming / Software engineering / Computing / Build automation / Compiling tools / Software design patterns / C++ / Make / Monad / Apache Ant / Include directive / Haskell

        c ACM, 2012. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. ⃝ Not for redistribution. The definitive version was published in The International Conference on F

        Add to Reading List

        Source URL: ndmitchell.com

        Language: English - Date: 2018-09-25 06:02:59
        UPDATE