Theory of operation

Results: 239



#Item
21Auctions / Auction theory / Auction / Jamaica

News Release 29 July 2016 Auction Results for Bank of Jamaica 14-day Repurchase Operation Applications were opened on Friday, 29 July 2016 by Bank of Jamaica, for the provision of Jamaica Dollar liquidity, in the amount

Add to Reading List

Source URL: www.boj.org.jm

Language: English - Date: 2016-07-29 18:20:45
22Decision theory / Information systems / Spatial decision support system / Spatial analysis / Decision support system / Database

A SPATIAL DECISION SUPPORT SYSTEM FOR LOCATIONAL PLANNING: DESIGN, IMPLEMENTATION AND OPERATION Paul J. Densham Department of Geography University of Iowa, Iowa City, IA

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 00:16:37
23Quantum mechanics / Quantum information science / Philosophy of science / Quantum states / Modal logic / Ontic / Interpretations of quantum mechanics / Spekkens Toy Model / No-cloning theorem / Quantum entanglement / Mathematical formulation of quantum mechanics / Quantum operation

In defense of the epistemic view of quantum states: a toy theory Robert W. Spekkens arXiv:quant-ph/0401052v2 7 OctPerimeter Institute for Theoretical Physics,

Add to Reading List

Source URL: cqi.inf.usi.ch

Language: English - Date: 2012-02-22 09:04:02
24Homotopy theory / Algebraic topology / K-theory / Algebraic geometry / Cohomology / J-homomorphism / Adams operation / Cohomology theories / Topological K-theory / Michael Atiyah

Research Seminar of the GRK 1150 Homotopy and Cohomology (WS): The J-homomorphism and the Adams conjecture Organizers: Johannes Ebert; Gerald Gaudens Talk 1. (G´erald Gaudens) Introduction to K-theory and over

Add to Reading List

Source URL: www.math.uni-bonn.de

Language: English - Date: 2008-11-17 07:59:04
25Cryptography / Block cipher modes of operation / Ciphertext stealing / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / Encryption / Disk encryption theory / Probabilistic encryption

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:26:41
26Psychometrics / Educational psychology / Educational research / Standardized tests / Organisation for Economic Co-operation and Development / National Assessment of Educational Progress / Item response theory / Programme for International Student Assessment / Trends in International Mathematics and Science Study / Educational assessment / Progress in International Reading Literacy Study / Multiple choice

Principles of multiple matrix booklet designs and parameter recovery in largescale assessments Eugenio Gonzalez Educational Testing Service, Princeton, NJ, USA1 Leslie Rutkowski

Add to Reading List

Source URL: ierinstitute.org

Language: English - Date: 2012-01-04 07:01:18
27

NOTHING IS SOMETHING The Theory and Operation of a Phase-Conjugated Vacuum Triode. Floyd A. "Sparky" Sweet - June 24th, 1988 THEORETICAL OVERVIEW Nothing, on the cosmological scale, is virtually everything. It is the hom

Add to Reading List

Source URL: www.hyiq.org

Language: English - Date: 2014-11-22 11:49:45
    28Cryptography / Block cipher modes of operation / Disk encryption theory / Advanced Encryption Standard / Padding / Universal hashing / Cipher

    AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2015-10-15 15:27:48
    29

    Time for curry Jc Beall & David Ripley∗ This paper presents a new puzzle for certain positions in the theory of truth. The relevant positions can be stated in a language including a truth predicate T and an operation p

    Add to Reading List

    Source URL: homepages.uconn.edu

    Language: English - Date: 2011-01-09 09:50:33
      30

      Time for curry Jc Beall & David Ripley∗ This paper presents a new puzzle for certain positions in the theory of truth. The relevant positions can be stated in a language including a truth predicate T and an operation p

      Add to Reading List

      Source URL: homepages.uconn.edu

      Language: English - Date: 2011-01-09 09:50:33
        UPDATE