Binary logarithm

Results: 93



#Item
11Computing Fundamentals Salvatore Filippone  2012–2013

Computing Fundamentals Salvatore Filippone 2012–2013

Add to Reading List

Source URL: people.uniroma2.it

Language: English - Date: 2014-09-23 08:12:56
12Recursive Session Types Revisited Ornela Dardha∗ School of Computing Science, University of Glasgow, UK   Session types model structured communication-based programming. In particular, binary

Recursive Session Types Revisited Ornela Dardha∗ School of Computing Science, University of Glasgow, UK Session types model structured communication-based programming. In particular, binary

Add to Reading List

Source URL: www.dcs.gla.ac.uk

Language: English - Date: 2014-07-25 10:12:01
13C A R PA R K M A P  SHOPS YOUR CHIP COIN WILL IDENTIFY WHICH COLOUR CAR PARK YOU HAVE PARKED IN.

C A R PA R K M A P SHOPS YOUR CHIP COIN WILL IDENTIFY WHICH COLOUR CAR PARK YOU HAVE PARKED IN.

Add to Reading List

Source URL: uk.westfield.com

Language: English - Date: 2015-07-19 23:10:50
14Calculators / Mathematical notation / Office equipment / Binary operations / Logarithm / Multiplication / Pi / Software calculator / Natural logarithm / Mathematics / Elementary mathematics / Logarithms

10) There are 3 different methods you can use to reach the answer of 2010, as shown below. For most MScs at LSHTM you will not need to be confident at using all 3 of these methods so just familiarise yourself with whiche

Add to Reading List

Source URL: studyskills.lshtm.ac.uk

Language: English - Date: 2012-09-14 12:22:43
15Cache-Oblivious Data Structures for Orthogonal Range Searching Pankaj K. Agarwal∗ Lars Arge†

Cache-Oblivious Data Structures for Orthogonal Range Searching Pankaj K. Agarwal∗ Lars Arge†

Add to Reading List

Source URL: www.cs.swarthmore.edu

Language: English - Date: 2003-09-17 11:15:54
16An Attack Against Fixed Value Discrete Logarithm Representations Gergely Alp´ ar1,2⋆ , Jaap-Henk Hoepman1,2 , and Wouter Lueks1,2⋆⋆ 1

An Attack Against Fixed Value Discrete Logarithm Representations Gergely Alp´ ar1,2⋆ , Jaap-Henk Hoepman1,2 , and Wouter Lueks1,2⋆⋆ 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-02-28 05:16:42
176.889 — Lecture 4: Single-Source Shortest Paths Christian Sommer  September 19 and 26, 2011 Single-Source Shortest Path (SSSP) Problem: given a graph G = (V, E) and a source vertex s ∈ V , compute shortes

6.889 — Lecture 4: Single-Source Shortest Paths Christian Sommer September 19 and 26, 2011 Single-Source Shortest Path (SSSP) Problem: given a graph G = (V, E) and a source vertex s ∈ V , compute shortes

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-09-26 10:03:02
18This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
19CCCG 2011, Toronto ON, August 10–12, 2011  Finding The Maximum Density Axes Parallel Regions for Weighted Point Sets Ananda Swarup Das

CCCG 2011, Toronto ON, August 10–12, 2011 Finding The Maximum Density Axes Parallel Regions for Weighted Point Sets Ananda Swarup Das

Add to Reading List

Source URL: 2011.cccg.ca

Language: English - Date: 2011-08-06 04:11:13
20Binary Addition on Cellular Automata

Binary Addition on Cellular Automata

Add to Reading List

Source URL: www.complex-systems.com

Language: English - Date: 2013-03-26 14:31:28