Lattice

Results: 2279



#Item
981D. Andre´ d’Avignon1 G. Larry Bretthorst1 Marilyn Emerson Holtzer1 Kathleen A. Schwarz1 Ruth Hogue Angeletti2 Lisa Mints2

D. Andre´ d’Avignon1 G. Larry Bretthorst1 Marilyn Emerson Holtzer1 Kathleen A. Schwarz1 Ruth Hogue Angeletti2 Lisa Mints2

Add to Reading List

Source URL: bayes.wustl.edu

Language: English - Date: 2011-04-28 11:57:20
982High Performance Computing II  Lecture 34 Topic 6: Cellular Automaton Methods – Continued The Lattice Gas Cellular Automata model of Frisch, Hasslacher and Pomeau was much

High Performance Computing II Lecture 34 Topic 6: Cellular Automaton Methods – Continued The Lattice Gas Cellular Automata model of Frisch, Hasslacher and Pomeau was much

Add to Reading List

Source URL: www.physics.buffalo.edu

Language: English - Date: 2014-03-25 12:14:08
9839 Finite Elements  We have seen how to use finite differences to approximate partial differential equations on a lattice, and how to analyze and improve the stability and accuracy of these approximations. As powerful as

9 Finite Elements We have seen how to use finite differences to approximate partial differential equations on a lattice, and how to analyze and improve the stability and accuracy of these approximations. As powerful as

Add to Reading List

Source URL: fab.cba.mit.edu

Language: English - Date: 2014-03-18 08:26:45
984Face Recognition with Multilevel B-Splines and Support Vector Machines Manuele Bicego Gianluca Iacono

Face Recognition with Multilevel B-Splines and Support Vector Machines Manuele Bicego Gianluca Iacono

Add to Reading List

Source URL: profs.sci.univr.it

Language: English - Date: 2011-10-29 17:46:26
985International nongovernmental organizations / Lattice theory / Lattice-based access control / International Conference on Availability /  Reliability and Security / Multilevel security / Secure communication / Capability-based security / Role-based access control / Mandatory access control / Computer security / Security / Access control

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:35:16
986A cellular automata rule which exhibits rotationally isotropic motion in a 3D cartesian lattice: a glider which moves at independent speeds simultaneously along the different axes in three (or more) dimensions Henry Min

A cellular automata rule which exhibits rotationally isotropic motion in a 3D cartesian lattice: a glider which moves at independent speeds simultaneously along the different axes in three (or more) dimensions Henry Min

Add to Reading List

Source URL: busyboxes.org

Language: English - Date: 2014-10-04 15:16:00
987Formation of Scientific Fields as a Universal Topological Transition Luís M. A. Bettencourt David I. Kaiser

Formation of Scientific Fields as a Universal Topological Transition Luís M. A. Bettencourt David I. Kaiser

Add to Reading List

Source URL: www.santafe.edu

Language: English - Date: 2015-03-31 13:30:07
988Securing the cloud with homomorphic encryption Research Directorate staff

Securing the cloud with homomorphic encryption Research Directorate staff

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-06-10 12:49:49
9891 Materials Science  PF Activity Report 2013 #31 (I) a in =0.2538

1 Materials Science PF Activity Report 2013 #31 (I) a in =0.2538

Add to Reading List

Source URL: pfwww.kek.jp

Language: English - Date: 2014-10-17 03:54:33
9901 Materials Science  PF Activity Report 2013 #31 Charge-Cluster Glass in an Organic Conductor with Triangular Lattice

1 Materials Science PF Activity Report 2013 #31 Charge-Cluster Glass in an Organic Conductor with Triangular Lattice

Add to Reading List

Source URL: pfwww.kek.jp

Language: English - Date: 2014-11-13 21:10:29