"\\\"(其後字詞)無法查詢, 因為 聯合目錄 的查詢上限是256個字。
符合的藏品
共找到 35 筆符合的資料

On the Law of the Iterated Log...
Law of the iterated logarithm Strong law of large numbers L-statistics 國家圖書館 20080900 期刊論文 Li, Deli.....more
- 1/35

Steel Building Frame Design wi...
Steel frame Neural networks Back-propagation Logarithm 國家圖書館 20060300 期刊論文 葉怡成(Yeh, I-cheng) Steel.....more
- 2/35

Provably Secure Blind Threshol...
Provably secure blind signatures Threshold signatures Discrete logarithm Secure e-cash systems.....more
- 3/35

Secure Key-Evolving for Public...
Provable security Discrete logarithm Key management Key evolving Key independence 國家圖書館 20040300 期刊.....more
- 4/35

Applying the Law of Iterated L...
Cumulative meta-analysis Fixed effects model Law of iterated logarithm Multiple inspections Random.....more
- 5/35

A Fast Base-K Logarithm with R...
Logarithm Carry-free addition Redundant repressentation Computer arithmetic Multiplication 國家圖書館.....more
- 6/35

A Note on Generalized Logarith...
Boehmian Generalized logarithm Mikusinski operator 國家圖書館 19970300 期刊論文 Nemzer,Dennis A Note.....more
- 7/35

Extending RSA Cryptosystems to...
Cryptography Proxy signature Discrete logarithm Factoring 國家圖書館 20060500 期刊論文 Chien, Hung-yu.....more
- 8/35

The LIL for the Estimates of t...
Partly linear regression model Convergence rate The law of the iterated logarithm 國家圖書館 19991200 期刊.....more
- 9/35

對數Logarithm之起源變遷
對數 Logarithm 國家圖書館 20051200 期刊論文 封仲源 對數Logarithm之起源變遷 臺灣期刊論文索引系統 來源期刊:無線電界 卷期:86:6 民94.12 頁次:頁57-59.....more
- 10/35

對數Logarithm之起源變遷
對數 Logarithm 國家圖書館 20051200 期刊論文 封仲源 對數Logarithm之起源變遷 臺灣期刊論文索引系統 來源期刊:無線電技術季刊 卷期:44:4=176 民94.12 頁次.....more
- 11/35

Strong Laws of R/S Statistics ...
Law of the iterated logarithm Long-range memory R/S statistics 國家圖書館 20050700 期刊論文 Lin, Zhengyan.....more
- 12/35

Strong Limit Theorems on Model...
Generalized linear models Law of the iterated logarithm Maximum likelihood estimator Model.....more
- 13/35

Signature Schemes with Efficie...
Digital signature Discrete logarithm-based signature Factorization of RSA modulus RSA-based.....more
- 14/35

An Improvement of Proxy Multi-...
Elliptic curve cryptosystem Proxy signature Integer factorization Discrete logarithm Cryptography 國.....more
- 15/35