Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
function attacking » functions attacking, function tracking, function making
attacking https » teaching https
https function » its function, sites function, ups function
function attacking » functions attacking, function tracking, function making
attacking https » teaching https
https function » its function, sites function, ups function
1
Table of Contents:
“...Preliminaries -- Model Elliptic Problems -- Model Parabolic Problems -- Systems -- Equations...”
View full text
View full text
Electronic
eBook
2
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
Subjects:
“...Algorithm Analysis and Problem Complexity. https://scigraph.springernature.com/ontologies/product...”Published 2014
View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“...Computational Study of Blood Flow through Elastic Arteries with Porous Effects -- A Modified...”View full text
Electronic
eBook
4
Published 2015
Table of Contents:
“... Dust Reinforced Epoxy Composite Using Grey Relational Analysis -- Weight Computation of Alternatives...”View full text
Electronic
eBook
5
Published 2015
Table of Contents:
“... with Structural Plasticity: Attacking the Subset Sum Problem -- P Systems with Generalized Multisets over Totally...”View full text
Electronic
eBook
6
Published 2015
Table of Contents:
“...Computers and the Mechanics of Communication. Outline of a Vision from the Work of Petri and Holt...”View full text
Electronic
eBook
7
Table of Contents:
“...Introduction -- Generalities -- Equivalence relations of functions -- Bent functions -- New classes...”
View full text
View full text
Electronic
eBook
8
Published 2005
Table of Contents:
“... Submonoid of the Free Monoid -- On Computational Universality in Language Equations -- Attacking the Common...”View full text
Electronic
eBook
9
Published 2005
Table of Contents:
“... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...”View full text
Electronic
eBook
10
Published 2006
Table of Contents:
“... of Distributed Denial of Service Attacks -- Session II B: Grid and P2P Computing -- Auction Based Resource...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“...EvoCOMNET Contributions -- Detection of DDoS Attacks via an Artificial Immune System-Inspired...”View full text
Electronic
eBook
12
Published 2005
Table of Contents:
“... Grid -- Session 1: Grid Computing -- CGSV: An Adaptable Stream-Integrated Grid Monitoring System...”View full text
Electronic
eBook
13
Published 2006
Table of Contents:
“... Group Problems -- Canonical Decomposition of a Regular Factorial Language -- Acyclic Bidirected and Skew...”View full text
Electronic
eBook
14
Published 2008
Table of Contents:
“...Algorithms and Implementations -- Computing the Minkowski Value of the Exponential Function over a...”View full text
Electronic
eBook
15
Computer Mathematics 9th Asian Symposium (ASCM2009), Fukuoka, December 2009, 10th Asian Symposium...
Published 2014
Table of Contents:
“... the Symbolic Solution of a Geometric Problem through Numeric Computations -- A Simple Quantifier-free Formula...”View full text
Electronic
eBook
16
Table of Contents:
“...Solving Problems Using Properties of Functions -- Polynomials -- Problems from Trigonometry...”
View full text
View full text
Electronic
eBook
17
by Boon, Chian Tea, Kamel Ariffin, Muhammad Rezal, Abd Ghafar, Amir Hamzah, Sapar, Siti Hasana, Mohamat Johari, Mohamat Aidil
Published 2022
“..., in 2014, proposed a new identification (ID) scheme based on the Bivariate Function Hard Problem (BFHP...”Published 2022
Article
18
Published 2012
Table of Contents:
“... Stream Cipher RAKAPOSHI -- Boomerang Distinguishers for Full HAS-160 Compression Function -- Polynomial...”View full text
Electronic
eBook
19
Table of Contents:
“...1 Introduction: Geomathematical Motivation -- Part I: Auxiliary Functions -- 2 The Gamma Function...”
View full text
View full text
Electronic
eBook
20
Published 2013
Table of Contents:
“... Algorithms for Stochastic Steiner Tree Problems -- Action Investment Energy Games -- Ciphertext-Only Attack...”View full text
Electronic
eBook



