Yahoo Suche Web Suche

Suchergebnisse

  1. Suchergebnisse:
  1. drops.dagstuhl.de › entities › documentPhysical Ring Signature

    Vor 2 Tagen · Ronald L. Rivest, Adi Shamir, and Yael Tauman. How to leak a secret. In Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, volume 2248 of Lecture Notes in Computer Science, pages ...

  2. dblp.org › db › confdblp: COLT

    Vor 4 Tagen · Ronald L. Rivest, David Haussler, Manfred K. Warmuth: Proceedings of the Second Annual Workshop on Computational Learning Theory, COLT 1989, Santa Cruz, CA, USA, July 31 - August 2, 1989. Morgan Kaufmann 1989 , ISBN 1-55860-086-8 [contents]

  3. Vor 3 Tagen · “Introduction to Algorithms” by Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein: A comprehensive guide to algorithms. Refer to official documentation for detailed and accurate information about programming languages and frameworks. For example: Python Documentation; Java Documentation; JavaScript Documentation

  4. dblp.org › db › confdblp: ASIACRYPT

    Vor 2 Tagen · Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto: Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings.

  5. Vor 5 Tagen · Abstract: This article discusses a common error encountered when using nested functions to determine the conditional median. We will examine the issue and suggest potential solutions. 2024-05-26 by UserComp.com Editors. Nested Functions: Determining Conditional Median Error Array.

  6. Vor 3 Tagen · Dan S. Wallach, Ronald L. Rivest: 2006 USENIX/ACCURATE Electronic Voting Technology Workshop, EVT'06, Vancouver, BC, Canada, August 1, 2006. USENIX Association 2006 [contents]

  7. Vor 5 Tagen · Completely updated, this book explains how computer designers can follow the structured model to develop efficient hardware and software systems. New information has been included on UNIX, OS/2, INTEL 8088/80286/80386, Motorola 68000/68020/68030 and RISC machine.