Yahalom

Results: 13



#Item
1VARIATIONAL APPROACH FOR COUPLED BACKWARD AND FORWARD WAVE EXCITATION IN FREE-ELECTRON LASERS∗ Asher Yahalom† , Yosef Pinhasi & Yuri Lurie College of Judea and Samaria, Ariel 44284, Israel Abstract In a recent paper

VARIATIONAL APPROACH FOR COUPLED BACKWARD AND FORWARD WAVE EXCITATION IN FREE-ELECTRON LASERS∗ Asher Yahalom† , Yosef Pinhasi & Yuri Lurie College of Judea and Samaria, Ariel 44284, Israel Abstract In a recent paper

Add to Reading List

Source URL: www.eng.tau.ac.il

Language: English - Date: 2005-11-06 03:41:00
    2Journal of Non-Crystalline Solids–2924 www.elsevier.com/locate/jnoncrysol Control of wave propagation in a dielectric medium by tailoring its dispersive properties Asher Yahalom *, Yosef Pinhasi

    Journal of Non-Crystalline Solids–2924 www.elsevier.com/locate/jnoncrysol Control of wave propagation in a dielectric medium by tailoring its dispersive properties Asher Yahalom *, Yosef Pinhasi

    Add to Reading List

    Source URL: www.eng.tau.ac.il

    Language: English - Date: 2005-11-06 03:41:00
      3

      Appendix B-2 New wiggler magnets measurement Malachi Harpaz, Prof. Asher Yahalom, Efraim Mengisto

      Add to Reading List

      Source URL: www.eng.tau.ac.il

      Language: English - Date: 2007-12-16 03:41:46
        4MILLIMETER WAVES SENSING BEHIND WALLS - FESEABILITY STUDY WITH FEL RADIATION* B.Kapilevich, M.Einat, A.Yahalom, M.Kanter, B.Litvak, The Israeli FEL Knowledge Center, The Ariel University Center of Samaria, Ariel, 44837,

        MILLIMETER WAVES SENSING BEHIND WALLS - FESEABILITY STUDY WITH FEL RADIATION* B.Kapilevich, M.Einat, A.Yahalom, M.Kanter, B.Litvak, The Israeli FEL Knowledge Center, The Ariel University Center of Samaria, Ariel, 44837,

        Add to Reading List

        Source URL: www.eng.tau.ac.il

        Language: English - Date: 2007-12-10 05:26:44
          5Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

          Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

          Add to Reading List

          Source URL: www.spacios.eu

          Language: English - Date: 2014-10-17 10:40:00
          6A Collaborative Approach to Autonomic Security Protocols Hongbin Zhou Department of Computer Science University College, Cork Cork, Ireland

          A Collaborative Approach to Autonomic Security Protocols Hongbin Zhou Department of Computer Science University College, Cork Cork, Ireland

          Add to Reading List

          Source URL: www.cs.ucc.ie

          Language: English - Date: 2004-10-08 09:05:15
          7Downloaded from pmj.bmjjournals.com on 17 August[removed]Perichondritis: a complication of piercing auricular cartilage S Yahalom and R Eliashar Postgrad. Med. J. 2003;79;29doi:[removed]pmj[removed]

          Downloaded from pmj.bmjjournals.com on 17 August[removed]Perichondritis: a complication of piercing auricular cartilage S Yahalom and R Eliashar Postgrad. Med. J. 2003;79;29doi:[removed]pmj[removed]

          Add to Reading List

          Source URL: www.hawaii.edu

          Language: English - Date: 2005-08-17 16:47:35
          8Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Jim Alves-Foss Center for Secure and Dependable Software University of Idaho Moscow, ID[removed]

          Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Jim Alves-Foss Center for Secure and Dependable Software University of Idaho Moscow, ID[removed]

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 1999-11-05 00:00:00
          9A Semantics for a Logic of Authentication (Extended Abstract) Martn Abadi  Digital Equipment Corporation

          A Semantics for a Logic of Authentication (Extended Abstract) Martn Abadi Digital Equipment Corporation

          Add to Reading List

          Source URL: www.markrtuttle.com

          Language: English - Date: 2007-04-26 00:00:00
          10The Modelling and Analysis of Security Protocols: the CSP Approach P.Y.A. Ryan, S.A. Schneider, M.H. Goldsmith, G. Lowe and A.W. Roscoe

          The Modelling and Analysis of Security Protocols: the CSP Approach P.Y.A. Ryan, S.A. Schneider, M.H. Goldsmith, G. Lowe and A.W. Roscoe

          Add to Reading List

          Source URL: www.computing.surrey.ac.uk

          Language: English - Date: 2010-12-15 14:57:33