Pseudo-

Results: 1000



#Item
351Ring theory / Algebraic structures / Algorithmic skeleton / Generic programming / Threads / Ring / Torus / Recursion / Pseudo-ring / Computing / Computer programming / Concurrent computing

1 Skeletons for Recursively Unfolding Process Topologies Jost Berthold and Rita Loogena Fachbereich Mathematik und Informatik, Philipps-Universit¨at Marburg, Hans-Meerwein-Straße, DMarburg, Germany.

Add to Reading List

Source URL: www.mathematik.uni-marburg.de

Language: English - Date: 2005-11-24 07:07:50
352Gingrich / Donald Rumsfeld

Story-Games Names Project PSEUDO-AMERICAN Compiled by Graham Walmsley MALE 1.

Add to Reading List

Source URL: www.bullypulpitgames.com

Language: English - Date: 2006-11-29 13:38:36
353Computer architecture / SONET / Network protocols / Metro Ethernet / Network topology / Carrier Ethernet / Pseudo-wire / Multiprotocol Label Switching / Synchronous optical networking / Network architecture / Computing / Ethernet

Carrier Ethernet Tutorial

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2013-12-10 20:18:32
354Physics / Astrophysics / Planetary science / Jets / Solar System / Energetic neutral atom / Heliosphere / Interstellar Boundary Explorer / Solar wind / Space plasmas / Astronomy / Plasma physics

Pseudo IBEX data Generator and Model Interface (PIGMI) Christina Prested1, Jacob Heerikhuisen2, Dave McComas3, Jamison Passuite1, Brent Randol1, Michelle Reno3, Nathan Schwadron1 and Brian Stuart1 1

Add to Reading List

Source URL: ibex.swri.edu

Language: English - Date: 2007-08-31 15:19:20
355Government / Cryptography / Financial cryptography / Electronic voting / Blind signature / Voter registration / Electoral fraud / Voter ID laws / Politics / Election fraud / Elections

Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols Orhan Cetinkaya Institute of Applied Mathematics, METU, Ankara, Turkey Abstract

Add to Reading List

Source URL: www.ceng.metu.edu.tr

Language: English - Date: 2007-03-01 07:18:29
356Computer programming / Perl / Object-oriented programming / Subroutines / Destructor / Perl module / Constructor / Main function / Foobar / Software engineering / Computing / Method

Perl versiondocumentation - NEXT NAME NEXT.pm - Provide a pseudo-class NEXT (et al) that allows method redispatch SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 16:04:27
357Book of Genesis / Christian eschatology / Sayings of Jesus / Christian theology / Apocalypse of Pseudo-Ephraem / Manchester Hymnal / Christianity / Religion / Early Christianity and Judaism

The following are the readings for the Sixth Sunday of Easter, May 25, according to the Revised Common (RCL), Episcopal (ECUSA), Roman Catholic, Canadian BAS, and the Church of England (Common Worship) lectionaries. All

Add to Reading List

Source URL: www.satucket.com

Language: English - Date: 2014-05-18 20:51:14
358Old Testament theology / Liturgy of the Hours / Manchester Hymnal / Music / Apocalypse of Pseudo-Ephraem / Christianity / Religion / Jesus

The following are the readings for the Eighth Sunday after the Epiphany, Feb. 27, according to the Revised Common (RCL), Episcopal (ECUSA), Roman Catholic, Canadian, and Church of England (CofE) Lectionaries. All reading

Add to Reading List

Source URL: www.satucket.com

Language: English - Date: 2000-02-20 21:46:42
359Security / Access control / User / Multi-touch / Touchscreen / Two-factor authentication / Password manager / User interface techniques / Password / Computing

The Use of Pseudo Pressure in Authenticating Smartphone Users 1 Ahmed Sabbir Arif1, Ali Mazalek1, Wolfgang Stuerzlinger2 2

Add to Reading List

Source URL: synlab.gatech.edu

Language: English - Date: 2015-01-21 11:07:49
360Block cipher / Ciphertext / Keystream / Initialization vector / Cryptography / Stream ciphers / Block cipher modes of operation

COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:43
UPDATE