Identity matrix

Results: 46



#Item
21Matrices / Sparse matrices / Abstract algebra / Matrix theory / Matrix / Transpose / Identity matrix / Adjugate matrix / Hadamard matrix / Algebra / Linear algebra / Mathematics

An introduction to matrices Jackie Nicholas Mathematics Learning Centre University of Sydney

Add to Reading List

Source URL: sydney.edu.au

Language: English - Date: 2010-07-15 23:19:05
22Matrices / Matrix / Invertible matrix / Rank / Identity matrix / Logical matrix / Algebra / Linear algebra / Mathematics

A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function Vlastimil Klima1 and Petr Susil2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-15 19:22:21
23Modular forms / Elliptic functions / Q-analogs

THE POLAR REPRESENTATION THEOREM FOR LINEAR HAMILTONIAN SYSTEMS JORGE REZENDE Let n = 1, 2, . . .. If M is a real matrix, we shall denote M ∗ its transpose. In is the identity n × n matrix.

Add to Reading List

Source URL: gfm.cii.fc.ul.pt

Language: English - Date: 2006-11-10 04:57:26
24Algebra of random variables / Beamforming / Sonar / Covariance matrix / Covariance / Statistics / Covariance and correlation / Signal processing

IDENTITY THEFT/ACCOUNT TAKEOVER FRAUD INFORMATION FOR PERSONAL BANKING CLIENTS Identity Theft/Account Takeover - How does this happen? This type of crime occurs when a thief obtains personal and banking information and i

Add to Reading List

Source URL: www.firstmidwest.com

Language: English - Date: 2013-09-27 17:57:10
25Object-oriented programming / Identity management / Capability-based security / Access Control Matrix / Access token / Principle of least privilege / File system / Class / Computer security / Security / Access control

Practical Least Privilege Security Reader Chapter 7: concept 0.3 Jan[removed]

Add to Reading List

Source URL: polacanthus.net

Language: English - Date: 2008-01-25 08:19:46
26Access control / Role-based access control / Identity management / Filesystem permissions / Delegation / Privilege / PERMIS / Access Control Matrix / Ls / Computer security / Security / Computing

A Role-Based Delegation Model and Some Extensions Ezedin Barka and Ravi Sandhu Laboratory for Information Security Technology Information and Software Engineering Department, MS 4A4 George Mason University, Fairfax, VA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
27Uniform Standards of Professional Appraisal Practice / Identity management / Credential / Knowledge

Sanction Matrix - WORKING DRAFT Type of violation: Minor Severe

Add to Reading List

Source URL: www.asc.gov

Language: English - Date: 2014-10-08 09:34:53
28Fiction / Film / D. Harlan Wilson / Literary genres / Peckinpah: An Ultraviolent Romance / Dr. Identity / The Matrix / Ace Books / Novel / Literature / Books / Technologized Desire

Technologized Desire www.GuideDogBooks.com 5103 72nd Place Hyattsville, MD[removed]3840

Add to Reading List

Source URL: www.dharlanwilson.com

Language: English - Date: 2014-09-03 13:45:57
29Politics of the United States / Discrimination / Identity politics / Debt bondage / Jim Crow laws / Reconstruction / Racism / Patricia McKissack / Ethics / Discrimination in the United States / Race legislation in the United States

6.1 Teacher Resource—Completed Category Matrix Page 1 of 1 Title of Book: Goin’ Someplace Special Author/Illustrator: Patricia C. McKissack, illustrated by Jerry Pinkney During Reading, Record: Evidence in the Text

Add to Reading List

Source URL: www.alaeditions.org

Language: English - Date: 2011-12-15 12:43:38
30Kullback–Leibler divergence / Thermodynamics / Data fusion / Estimation theory / Wireless sensor network / Entropy / Matrix / Statistics / Statistical theory / Information theory

A Distributed Multiple-Target Identity Management Algorithm in Sensor Networks

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2007-01-10 20:09:32
UPDATE