Prime-counting function

Results: 114



#Item
31American Journal of Mathematical Analysis, 2014, Vol. 2, No. 1, 4-7 Available online at http://pubs.sciepub.com/ajma/2/1/2 © Science and Education Publishing DOI:[removed]ajma[removed]On Inequalities of Trigonometrically

American Journal of Mathematical Analysis, 2014, Vol. 2, No. 1, 4-7 Available online at http://pubs.sciepub.com/ajma/2/1/2 © Science and Education Publishing DOI:[removed]ajma[removed]On Inequalities of Trigonometrically

Add to Reading List

Source URL: www.sciepub.com

Language: English
32Decision Making with Hierarchical Credal Sets? Alessandro Antonucci∗ , Alexander Karlsson† , and David Sundgren‡ ∗ Istituto Dalle Molle di Studi sull’Intelligenza Artificiale Manno-Lugano (Switzerland)

Decision Making with Hierarchical Credal Sets? Alessandro Antonucci∗ , Alexander Karlsson† , and David Sundgren‡ ∗ Istituto Dalle Molle di Studi sull’Intelligenza Artificiale Manno-Lugano (Switzerland)

Add to Reading List

Source URL: ipg.idsia.ch

Language: English - Date: 2014-11-04 15:29:09
33Open Problems on Exponential and Character Sums Igor E. Shparlinski Department of Computing, Macquarie University Sydney, NSW 2109, Australia [removed]

Open Problems on Exponential and Character Sums Igor E. Shparlinski Department of Computing, Macquarie University Sydney, NSW 2109, Australia [removed]

Add to Reading List

Source URL: web.science.mq.edu.au

Language: English - Date: 2013-04-07 21:19:17
34LFC BUMPS ON SEPARABLE BANACH SPACES ´ ´ ´ M. JIMENEZ-SEVILLA AND L. SANCHEZ-GONZ

LFC BUMPS ON SEPARABLE BANACH SPACES ´ ´ ´ M. JIMENEZ-SEVILLA AND L. SANCHEZ-GONZ

Add to Reading List

Source URL: eprints.ucm.es

Language: English - Date: 2014-02-06 04:54:10
35International Journal of Network Security, Vol.3, No.3, PP.296–299, Nov[removed]Is There A Shortage of Primes for Cryptography? Samuel S. Wagstaff, Jr.

International Journal of Network Security, Vol.3, No.3, PP.296–299, Nov[removed]Is There A Shortage of Primes for Cryptography? Samuel S. Wagstaff, Jr.

Add to Reading List

Source URL: ijns.femto.com.tw

Language: English - Date: 2006-04-05 23:50:03
36Analysis of a Classification-based Policy Iteration Algorithm  Alessandro Lazaric [removed] Mohammad Ghavamzadeh [removed]

Analysis of a Classification-based Policy Iteration Algorithm Alessandro Lazaric [removed] Mohammad Ghavamzadeh [removed]

Add to Reading List

Source URL: eprints.pascal-network.org

Language: English - Date: 2011-02-22 10:35:38
37Scaling Up Approximate Value Iteration with Options: Better Policies with Fewer Iterations Timothy A. Mann MANN @ EE . TECHNION . AC . IL Shie Mannor SHIE @ EE . TECHNION . AC . IL

Scaling Up Approximate Value Iteration with Options: Better Policies with Fewer Iterations Timothy A. Mann MANN @ EE . TECHNION . AC . IL Shie Mannor SHIE @ EE . TECHNION . AC . IL

Add to Reading List

Source URL: jmlr.org

Language: English - Date: 2014-02-16 19:30:21
38Is There a Formula that Generates Prime Numbers?

Is There a Formula that Generates Prime Numbers?

Add to Reading List

Source URL: www.sonoma.edu

Language: English - Date: 2008-09-26 19:57:37
39Efficient Optimal Learning for Contextual Bandits  Miroslav Dudik [removed]  Daniel Hsu

Efficient Optimal Learning for Contextual Bandits Miroslav Dudik [removed] Daniel Hsu

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2014-11-25 10:45:19
40Taming the Monster: A Fast and Simple Algorithm for Contextual Bandits arXiv:1402.0555v2 [cs.LG] 14 Oct[removed]Alekh Agarwal1 , Daniel Hsu2 , Satyen Kale3 , John Langford1 , Lihong Li1 , and

Taming the Monster: A Fast and Simple Algorithm for Contextual Bandits arXiv:1402.0555v2 [cs.LG] 14 Oct[removed]Alekh Agarwal1 , Daniel Hsu2 , Satyen Kale3 , John Langford1 , Lihong Li1 , and

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2014-11-25 10:45:20