Arithmetic function

Results: 443



#Item
51UNH_CMAC Version 2.1 The University of New Hampshire Implementation of the Cerebellar Model Arithmetic Computer - CMAC August 31, 1994 (last modified July, 1996) W. Thomas Miller and Filson H. Glanz

UNH_CMAC Version 2.1 The University of New Hampshire Implementation of the Cerebellar Model Arithmetic Computer - CMAC August 31, 1994 (last modified July, 1996) W. Thomas Miller and Filson H. Glanz

Add to Reading List

Source URL: incompleteideas.net

Language: English - Date: 2013-04-20 17:24:26
52Eureka Math™ Homework Helper 2015–2016 Grade 8 Module 1 Lessons 1–13

Eureka Math™ Homework Helper 2015–2016 Grade 8 Module 1 Lessons 1–13

Add to Reading List

Source URL: greatminds.net

Language: English - Date: 2015-09-11 14:55:22
53THE RIEMANN ZETA FUNCTION ON VERTICAL ARITHMETIC PROGRESSIONS XIANNAN LI AND MAKSYM RADZIWIÃLL Ã Abstract. We show that the twisted second moments of the Riemann zeta function averaged over the arithmetic progression 1

THE RIEMANN ZETA FUNCTION ON VERTICAL ARITHMETIC PROGRESSIONS XIANNAN LI AND MAKSYM RADZIWIÃLL Ã Abstract. We show that the twisted second moments of the Riemann zeta function averaged over the arithmetic progression 1

Add to Reading List

Source URL: math.rutgers.edu

Language: English - Date: 2015-01-23 14:12:26
    54Finiteness lengths of arithmetic groups over global function fields Ralf Gramlich An abstract group is said to be of type Fn , n ∈ N, if it admits a classifying space with a finite n-skeleton. It is of type F1 if and o

    Finiteness lengths of arithmetic groups over global function fields Ralf Gramlich An abstract group is said to be of type Fn , n ∈ N, if it admits a classifying space with a finite n-skeleton. It is of type F1 if and o

    Add to Reading List

    Source URL: perso.uclouvain.be

    Language: English - Date: 2009-02-01 11:04:23
      55The asymptotic behavior of a family of sequences .. P. Erdos Hungarian Academy of Sciences Budapest, Hungary A. Hildebrand *

      The asymptotic behavior of a family of sequences .. P. Erdos Hungarian Academy of Sciences Budapest, Hungary A. Hildebrand *

      Add to Reading List

      Source URL: www.dtc.umn.edu

      Language: English - Date: 1998-04-13 22:12:59
      56THE DIRICHLET PROBLEM FOR THE FRACTIONAL LAPLACIAN: REGULARITY UP TO THE BOUNDARY XAVIER ROS-OTON AND JOAQUIM SERRA Abstract. We study the regularity up to the boundary of solutions to the Dirichlet problem for the fract

      THE DIRICHLET PROBLEM FOR THE FRACTIONAL LAPLACIAN: REGULARITY UP TO THE BOUNDARY XAVIER ROS-OTON AND JOAQUIM SERRA Abstract. We study the regularity up to the boundary of solutions to the Dirichlet problem for the fract

      Add to Reading List

      Source URL: www.ma.utexas.edu

      Language: English - Date: 2014-08-14 13:37:58
      57Published in Proc. of “Conference on Automated Deduction (CADE)”, A Randomized Satisfiability Procedure for Arithmetic and Uninterpreted Function Symbols Sumit Gulwani and George C. Necula University of Califo

      Published in Proc. of “Conference on Automated Deduction (CADE)”, A Randomized Satisfiability Procedure for Arithmetic and Uninterpreted Function Symbols Sumit Gulwani and George C. Necula University of Califo

      Add to Reading List

      Source URL: www.cs.berkeley.edu

      - Date: 2010-10-29 12:59:29
        58A Randomized Satisfiability Procedure for Arithmetic and Uninterpreted Function Symbols 1 Sumit Gulwani , George C. Necula Department of Computer Science, UC-Berkeley, Berkeley, CA 94720, USA

        A Randomized Satisfiability Procedure for Arithmetic and Uninterpreted Function Symbols 1 Sumit Gulwani , George C. Necula Department of Computer Science, UC-Berkeley, Berkeley, CA 94720, USA

        Add to Reading List

        Source URL: www.cs.berkeley.edu

        Language: English - Date: 2010-10-29 12:59:41
          59Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

          Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

          Add to Reading List

          Source URL: www.bolet.org

          Language: English - Date: 2015-05-18 18:18:01
          60BRICS  Basic Research in Computer Science BRICS RSU. Kohlenbach: On the Uniform Weak K¨onig’s Lemma  On the Uniform Weak K¨onig’s Lemma

          BRICS Basic Research in Computer Science BRICS RSU. Kohlenbach: On the Uniform Weak K¨onig’s Lemma On the Uniform Weak K¨onig’s Lemma

          Add to Reading List

          Source URL: www.brics.dk

          Language: English - Date: 1999-06-22 09:34:21