Net Applications

Results: 1712



#Item
11

Motivation and overview Recognizing braided categories via X ⊗ X Sources of coincidences Examples and applications Coincidences of tensor categories

Add to Reading List

Source URL: tqft.net

Language: English - Date: 2012-11-27 12:34:27
    12

    2017 Call for New Members The 2017 call for new members to join the Global Young Academy in 2018 is now open. Applications are sought from young, independent scholars who combine the highest level of research excellence

    Add to Reading List

    Source URL: globalyoungacademy.net

    Language: English - Date: 2017-10-16 04:51:08
      13

      openpgp email security for mozilla applications The Handbook V 1.8

      Add to Reading List

      Source URL: enigmail.net

      Language: English - Date: 2016-02-13 09:04:15
        14

        187 Optimal Single Biarc Fitting and its Applications Hyungjun Park1 1

        Add to Reading List

        Source URL: www.researchgate.net

        Language: English
          15

          fp_developpement_applications-cloud_rv.ai

          Add to Reading List

          Source URL: www.nerim.net

          Language: French - Date: 2014-11-05 10:25:47
            16

            Integrated JPEG CODEC Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 ..................................

            Add to Reading List

            Source URL: mjpeg.sourceforge.net

            Language: English - Date: 2000-07-26 17:29:34
              17

              Published in Designs, Codes and Cryptography, 77(2):441–477, Linearly Homomorphic Structure-Preserving Signatures and Their Applications Benoˆıt Libert · Thomas Peters · Marc Joye · Moti Yung

              Add to Reading List

              Source URL: joye.site88.net

              Language: English - Date: 2015-10-02 18:24:31
                18

                Published in D. Naccache, Ed., Cryptography and Security: From Theory to Applications (Quisquater Festschrift), volof Lecture Notes in Computer Science, pp. 3-7, Springer, 2012. On Quisquater’s Multiplication Al

                Add to Reading List

                Source URL: joye.site88.net

                Language: English - Date: 2015-09-04 19:43:51
                  19

                  Protecting Applications Against TOCTTOU Races by User-Space Caching of File Metadata Mathias Payer Thomas R. Gross

                  Add to Reading List

                  Source URL: nebelwelt.net

                  Language: English - Date: 2018-08-13 04:44:10
                    20

                    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publicationA survey of cloud resource management for complex engineering applications Article in Frontiers o

                    Add to Reading List

                    Source URL: hpc.cs.tsinghua.edu.cn

                    Language: English
                      UPDATE