Initialization

Results: 404



#Item
181Signal processing / Digital signal processing / Integral transforms / Time series analysis / Window function / Fourier transform / Forcing / Chebyshev polynomials / Mathematical analysis / Mathematics / Fourier analysis

Dynamic Initialization to Improve Tropical Cyclone Intensity and Structure Forecasts Chi-Sann Liou Naval Research Laboratory, Monterey, CA (JHT Project, Progress Report)

Add to Reading List

Source URL: www.ofcm.gov

Language: English - Date: 2009-08-03 13:39:28
182Space / Plasma physics / Magnetic cloud / Solar wind / STEREO / Coronal mass ejection / Space plasmas / Astronomy / Astrophysics

Initialization of Numerical Models Remote solar observations of the photospheric magnetic field Remote coronal observations of

Add to Reading List

Source URL: stereo-ssc.nascom.nasa.gov

Language: English - Date: 2005-11-22 14:23:11
183Transport Layer Security / Block cipher modes of operation / Initialization vector / Padding / HTTP cookie / Chosen-plaintext attack / HTTP Secure / Ciphertext / WebSocket / Cryptography / Computing / Internet

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: blog.tempest.com.br

Language: English - Date: 2011-09-27 11:00:14
184Cross-platform software / C++ / Subroutines / Data types / Initialization / JavaScript / Programming language / C++ classes / Lisp / Software engineering / Computing / Computer programming

Master thesis Describing Live programming using program transformations and a callstack explicit interpreter by Olov Johansson

Add to Reading List

Source URL: blog.lassus.se

Language: English - Date: 2013-10-15 10:27:59
185IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Ian Goldberg Zero-Knowledge Systems

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
186Block cipher / Message authentication codes / Disk encryption theory / Mercy / Initialization vector / Advantage / Feistel cipher / Cipher / CBC-MAC / Cryptography / Block cipher modes of operation / Block ciphers

J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
187Computer programming / Initialization / Constructor / C++11 / C++ classes / Reference / Struct / New / Pointer / C++ / Software engineering / Computing

TERM PROJECT, FALL SEMESTER[removed]elevator C++11 Enhancements for Eclipse CDT Authors

Add to Reading List

Source URL: eprints.hsr.ch

Language: English - Date: 2013-02-13 08:09:05
188Human–computer interaction / Radio-frequency identification / Block cipher modes of operation / Initialization vector / Crypt / Impinj / RFdump / Cryptography / Automatic identification and data capture / Technology

Accepted to JTAER at May 7, 2009 Read / Write Performance for low memory passive HF RFID tag-reader system Chih-Cheng Ou Yang1, B.S. Prabhu2, Charlie Qu3, Chi-Cheng Chu4, and Rajit Gadh5

Add to Reading List

Source URL: www.wireless.ucla.edu

Language: English - Date: 2009-07-22 15:57:32
189Relational database management systems / Null / Oracle Database / SQL / Parameter / AS/400 Control Language / Where / Insert / Flip-flop / Computing / SQL keywords / Data management

Parameter Dependency and Statistics_level I. Parameter Dependency Many initialization parameters determine values of other parameters. For instance, setting OPTIMIZER_FEATURES_ENABLE to certain version will adjust many

Add to Reading List

Source URL: yong321.freeshell.org

Language: English - Date: 2009-11-06 11:32:50
190Cryptographic protocols / IEEE 802.11 / Pseudorandom number generators / Wired Equivalent Privacy / Fluhrer /  Mantin and Shamir attack / RC4 / Related-key attack / Initialization vector / Stream cipher / Cryptography / Wireless networking / Computer network security

AT&T Labs Technical Report TD-4ZCPZZ Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Revision 2

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-07-14 23:06:25
UPDATE