Search Results for ""
741 - 750 of 3357 for Neville theta functionsSearch Results
Binet's first formula for the log gamma function lnGamma(z), where Gamma(z) is a gamma function, is given by for R[z]>0 (Erdélyi et al. 1981, p. 21; Whittaker and Watson ...
The circle method is a method employed by Hardy, Ramanujan, and Littlewood to solve many asymptotic problems in additive number theory, particularly in deriving an asymptotic ...
The invariants of a Weierstrass elliptic function P(z|omega_1,omega_2) are defined by the Eisenstein series g_2(omega_1,omega_2) = 60sum^'_(m,n)Omega_(mn)^(-4) (1) ...
The case of the Weierstrass elliptic function with invariants g_2=0 and g_3=1. The corresponding real half-period is given by omega_2 = (Gamma^3(1/3))/(4pi) (1) = ...
An elliptic function can be characterized by its real and imaginary half-periods omega_1 and omega_2 (Whittaker and Watson 1990, p. 428), sometimes also denoted ...
In the equianharmonic case of the Weierstrass elliptic function, corresponding to invariants g_2=0 and g_3=1, the corresponding real half-period is given by omega_2 = ...
A hash function H projects a value from a set with many (or even an infinite number of) members to a value from a set with a fixed number of (fewer) members. Hash functions ...
The probability density function (PDF) P(x) of a continuous distribution is defined as the derivative of the (cumulative) distribution function D(x), D^'(x) = ...
The Möbius function is a number theoretic function defined by mu(n)={0 if n has one or more repeated prime factors; 1 if n=1; (-1)^k if n is a product of k distinct primes, ...
Birthday attacks are a class of brute-force techniques used in an attempt to solve a class of cryptographic hash function problems. These methods take advantage of functions ...
...
View search results from all Wolfram sites (500237 matches)

