Problem

Results: 43643



#Item
11Mathematical analysis / Analytic number theory / Mathematics / Complex analysis / Kloosterman sum / Modular form / Riemann hypothesis / Bessel function / Maass wave form

Proc. Int. Cong. of Math. – 2018 Rio de Janeiro, Vol–374) THE SUBCONVEXITY PROBLEM FOR L-FUNCTIONS Ritabrata Munshi

Add to Reading List

Source URL: eta.impa.br

Language: English - Date: 2018-07-25 13:17:43
12Estimation theory / Statistical inference / Actuarial science / Regression analysis / Linear regression / Path coefficient

Fixed Effects Assignment For this problem set you will need to use the Stata dataset on suicides on the class homepage. The dataset has state level data on suicides and suicide rates for the periodand was ori

Add to Reading List

Source URL: mason.gmu.edu

Language: English - Date: 2005-03-28 18:06:09
13Computer network security / IT infrastructure / Computing / Cloud infrastructure / Information and communications technology / Middlebox / Cloud computing / Akamai Technologies / Network address translation / Gateway / Computer network

Making Middleboxes Someone Else’s Problem: Network Processing as a Cloud Service Justine Sherry Shaddi Hasan

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2012-11-27 04:23:35
14Applied mathematics / Electrical engineering / Epistemology / Control engineering / Control theory / Cybernetics / Global optimization / Falsifiability / Linear time-invariant system / PROPT / Conjugate gradient method

Hybrid Approximate Gradient and Stochastic Descent for Falsification of Nonlinear Systems Shakiba Yaghoubi and Georgios Fainekos Abstract— Studying transient properties of nonlinear systems is an important problem for

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2018-02-08 16:28:22
15Algebra / Mathematics / Cryptography / Linear algebra / Lattice-based cryptography / Post-quantum cryptography / Lattice points / Computational hardness assumptions / Lattice / Euclidean vector / Basis / Crystal structure

Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices Shi Bai1 , Damien Stehl´e1 and Weiqiang Wen1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-08-31 11:57:10
16Theoretical computer science / Quantum computing / Quantum mechanics / Quantum information science / Emerging technologies / Quantum algorithms / Randomized algorithm / Qubit / Shor's algorithm / DeutschJozsa algorithm

Lecture 18, Tues March 28: Bernstein-Vazirani, Simon We ended last time with the Deutsch-Jozsa problem. Today we’ll start with another black-box problem for which quantum algorithms provide an advantage: The Bernstein-

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-08-26 18:23:23
17Computer access control / Computer security / Identity management / Identity / Federated identity / Single sign-on / Identity provider / Multi-factor authentication / Security Assertion Markup Language / OAuth / Password management / Integrated Windows Authentication

Application Security—Made in Switzerland Overview The problem of internet security is almost as old as the internet itself. But there is a reliable solution: Airlock Suite from Ergon. Airlock Suite is underpinned by

Add to Reading List

Source URL: www.airlock.com

Language: English - Date: 2016-09-15 09:49:08
18Computer programming / Theoretical computer science / Software engineering / Logic in computer science / Computational complexity theory / Boolean algebra / NP-complete problems / Formal methods / Boolean satisfiability problem / Conditional / Reduction / Algorithm

The Straight-Line Automatic Programming Problem Rajeev Joshi, Greg Nelson, Yunhong Zhou HP Laboratories Palo Alto HPLNovember 20th , 2003* superoptimization,

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:41:20
19Constraint programming / NP-complete problems / Puzzles / Crossword / Constraint satisfaction / Local consistency / Human behavior / Backtracking / Theoretical computer science / Cognition

Crossword Puzzles as a Constraint Problem Anbulagan and Adi Botea NICTA?? and Australian National University, Canberra, Australia {anbulagan|adi.botea}@nicta.com.au Abstract. We present new results in crossword composit

Add to Reading List

Source URL: abotea.rsise.anu.edu.au

Language: English - Date: 2008-06-30 05:38:49
20Mathematical analysis / Mathematics / Mathematical logic / Set theory / Operator theory / Code / Inner model theory / Partial differential equations / Complex analysis / Omega-regular language / Differential forms on a Riemann surface

Lecture 20, Tues April 4: Shor, Quantum Fourier Transform Last time we started in on Shor’s algorithm, a quantum algorithm that can factor ​N​ into ​p​×​q​ in polynomial time by reducing the problem to per

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-08-26 18:23:30
UPDATE