搜尋:logarithm

符合的藏品

On the Law of the Iterated Log...

Law of the iterated logarithm Strong law of large numbers L-statistics 國家圖書館 20080900 期刊論文 Li, Deli.....more

1/35

Steel Building Frame Design wi...

Steel frame Neural networks Back-propagation Logarithm 國家圖書館 20060300 期刊論文 葉怡成(Yeh, I-cheng) Steel.....more

2/35

Provably Secure Blind Threshol...

Provably secure blind signatures Threshold signatures Discrete logarithm Secure e-cash systems.....more

3/35

Secure Key-Evolving for Public...

Provable security Discrete logarithm Key management Key evolving Key independence 國家圖書館 20040300 期刊.....more

4/35

Applying the Law of Iterated L...

Cumulative meta-analysis Fixed effects model Law of iterated logarithm Multiple inspections Random.....more

5/35

A Fast Base-K Logarithm with R...

Logarithm Carry-free addition Redundant repressentation Computer arithmetic Multiplication 國家圖書館.....more

6/35

A Note on Generalized Logarith...

Boehmian Generalized logarithm Mikusinski operator 國家圖書館 19970300 期刊論文 Nemzer,Dennis A Note.....more

7/35

Extending RSA Cryptosystems to...

Cryptography Proxy signature Discrete logarithm Factoring 國家圖書館 20060500 期刊論文 Chien, Hung-yu.....more

8/35

The LIL for the Estimates of t...

Partly linear regression model Convergence rate The law of the iterated logarithm 國家圖書館 19991200 期刊.....more

9/35

對數Logarithm之起源變遷

對數 Logarithm 國家圖書館 20051200 期刊論文 封仲源 對數Logarithm之起源變遷 臺灣期刊論文索引系統 來源期刊:無線電界 卷期:86:6 民94.12 頁次:頁57-59.....more

10/35

對數Logarithm之起源變遷

對數 Logarithm 國家圖書館 20051200 期刊論文 封仲源 對數Logarithm之起源變遷 臺灣期刊論文索引系統 來源期刊:無線電技術季刊 卷期:44:4=176 民94.12 頁次.....more

11/35

Strong Laws of R/S Statistics ...

Law of the iterated logarithm Long-range memory R/S statistics 國家圖書館 20050700 期刊論文 Lin, Zhengyan.....more

12/35

Strong Limit Theorems on Model...

Generalized linear models Law of the iterated logarithm Maximum likelihood estimator Model.....more

13/35

Signature Schemes with Efficie...

Digital signature Discrete logarithm-based signature Factorization of RSA modulus RSA-based.....more

14/35

An Improvement of Proxy Multi-...

Elliptic curve cryptosystem Proxy signature Integer factorization Discrete logarithm Cryptography 國.....more

15/35
第 1 頁
共 3 頁
下一頁