Function key

Results: 1153



#Item
71Functions and mappings / Polynomials / Graphing calculators / Charts / Equations / Graph of a function / Quadratic equation / Quadratic function / Calculator / Discriminant / Function / Casio graphic calculators

Investigating Graphs This resource sheet is designed for use with the Casio fx-CG20. However it can be used with the Casio fx-9860GII or the Casio fx-9750GII although there may be some differences in the key sequences ne

Add to Reading List

Source URL: www.casiomedia.co.uk

Language: English - Date: 2011-12-19 07:31:08
72Computer keyboards / Input/output / Biometrics / Keystroke dynamics / Keypad / Numeric keypad / Typing / Personal identification number / Apple Keyboard / Telephone keypad / Function key / Feedback

Timing Attacks on PIN Input Devices Denis Foo Kune Yongdae Kim CSE Department

Add to Reading List

Source URL: randombits.io

Language: English - Date: 2015-06-29 10:17:09
73Office equipment / Mathematical notation / Calculator / Function key / Aplets & Cotlets / Comment / Computer keyboard / HP calculators / For loop / R / Software calculator

Computer Algebra and Mathematics with the HP40G Version 1.0

Add to Reading List

Source URL: www.hphomeview.com

Language: English - Date: 2008-10-13 11:47:57
74Biometrics / Cryptography / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
75Cryptocurrencies / Error detection and correction / Hashing / Bitcoin / Cryptographic hash functions / Bitcoin network / Merkle tree / Cryptographic nonce / Hash list / Hash function / Public-key cryptography / Digital signature

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
76Cryptography / Hashing / Cryptographic hash functions / Search algorithms / Public-key cryptography / Digital signature / EdDSA / Random oracle / Descriptor / Hash function / Advantage

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
77Neutron monitor / Neutron / Nuclear technology / Radiation / Beryllium / Ionizing radiation

Journal of Geophysical Research: Space Physics RESEARCH ARTICLE2015JA021993 Key Points: • A new neutron monitor yield function for solar neutrons is presented

Add to Reading List

Source URL: cc.oulu.fi

Language: English - Date: 2016-02-19 02:10:30
78Bayesian statistics / Bayesian inference / Prior probability / Beta distribution / Likelihood function / Statistical inference / Normal distribution / Confidence interval / Posterior probability / Conjugate prior / Marginal likelihood

16 Basic Bayesian Methods Mark E. Glickman and David A. van Dyk Summary In this chapter, we introduce the basics of Bayesian data analysis. The key ingredients to a

Add to Reading List

Source URL: www.glicko.net

Language: English - Date: 2009-12-24 15:06:45
79Fingerprinting algorithms / Hashing / Search algorithms / Locality-sensitive hashing / Hash function / MongoDB / Fingerprint / Chemical similarity / Cryptographic hash function / Acoustic fingerprint / IPython / Public key fingerprint

Michał Nowotka1, Anne Hersey1 [1] European Molecular Biology Laboratory - European Bioinformatics Institute Email: Locality Sensitive Hashing for compound similarity search.

Add to Reading List

Source URL: cisrg.shef.ac.uk

Language: English - Date: 2016-07-11 09:58:32
80Mathematical analysis / Probability / Expected value / Limit of a function / Mathematics / Probability theory / Stochastic processes

Seven Proofs for the Subadditivity of Expected Shortfall Paul Embrechts∗ and Ruodu Wang† October 7, 2015 Abstract Subadditivity is the key property which distinguishes the popular risk measures Valueat-Risk and Expec

Add to Reading List

Source URL: sas.uwaterloo.ca

Language: English - Date: 2015-10-07 04:20:07
UPDATE