TOPICS
Search

Search Results for ""


7401 - 7410 of 13135 for Inline 8Search Results
Birthday attacks are a class of brute-force techniques used in an attempt to solve a class of cryptographic hash function problems. These methods take advantage of functions ...
Bisection is the division of a given curve, figure, or interval into two equal parts (halves). A simple bisection procedure for iteratively converging on a solution which is ...
Let V(r) be the volume of a ball of radius r in a complete n-dimensional Riemannian manifold with Ricci curvature tensor >=(n-1)kappa. Then V(r)<=V_kappa(r), where V_kappa is ...
The number of binary bits necessary to represent a number, given explicitly by BL(n) = 1+|_lgn_| (1) = [lg(n+1)], (2) where [x] is the ceiling function, |_x_| is the floor ...
Bit rate (i.e., bits per second, abbreviated bps) is a measure of the number of data bits (digital 0s and 1s) transmitted each second in a digital communications channel. If ...
Let s(x,y,z) and t(x,y,z) be differentiable scalar functions defined at all points on a surface S. In computer graphics, the functions s and t often represent texture ...
A bitwin chain of length one consists of two pairs of twin primes with the property that they are related by being of the form: (n-1,n+1) and (2n-1,2n+1). (1) The first few ...
A divisor d of a positive integer n is biunitary if the greatest common unitary divisor of d and n/d is 1. For a prime power p^y, the biunitary divisors are the powers 1, p, ...
Let alpha(z),gamma(z):(a,b)->R^3 be curves such that |gamma|=1 and alpha·gamma=0, and suppose that alpha and gamma have holomorphic extensions alpha,gamma:(a,b)×(c,d)->C^3 ...
Black-Scholes theory is the theory underlying financial derivatives which involves stochastic calculus and assumes an uncorrelated log normal distribution of continuously ...
1 ... 738|739|740|741|742|743|744 ... 1314 Previous Next

...