|
|
|
|
| | | | Cryptanalytic Attacks on RSARSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science.... |
|
Extrapolation Methods (Studies in Computational Mathematics)This volume is a self-contained, exhaustive exposition of the extrapolation methods theory, and of the various algorithms and procedures for accelerating the convergence of scalar and vector sequences. Many subroutines (written in FORTRAN 77) with instructions for their use are provided on a floppy disk in order to demonstrate to those working with... | | Fundamentals of Three-dimensional Digital Image ProcessingThere are many areas of science and engineering where three-dimensional (3-D) discrete data are collected and analyzed, such as medical imaging and geoscience. To design and to prove the validity of computational procedures for processing and analysis of such data, the need for a mathematical theory and algorithms for image processing is essential.... | | |
|
|
Applied Computational Materials Modeling: Theory, Simulation and ExperimentThe scope of the proposed book is to identify and emphasize the successful link between computational materials modeling as a simulation and design tool and its synergistic application to experimental research and alloy development. Compared to other areas in science where computational modeling has made substantial contributions to the development... | | | | |
|
|
Result Page: 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 |