Mobile platforms operate under fundamentally different trust assumptions than we relied on for web security. Your mobile ...
Abstract: This paper considers the basic question of how strong of a probabilistic guarantee can a hash table, storing $n(1+\Theta(1))\log n$-bit key/value pairs ...
At its core, a continuous function is one that can be drawn without lifting your pen from the paper. More formally, a function f(x) is continuous at a point x = a if it satisfies three conditions: If ...
THE object of the authors of this volume of mathematical tables is “to supply a comprehensive set of tables of the numerical values of the elementary functions which are in constant use in mathematics ...
Your browser does not support the audio element. Tables are a useful tool for visualizing, organizing and processing data in JavaScript. To start using them, you need ...
THIS book is yet another example of a photolithoprint reproduction made in the United States by authority of the Alien Property Custodian. The original work, compiled by Emde at Stuttgart and ...
Abstract: Control flow is the execution order of individual statements, instructions, or function calls within an imperative program. Malicious operation of control flow (e.g., tampering with normal ...
IIIF provides researchers rich metadata and media viewing options for comparison of works across cultural heritage collections. Visit the IIIF page to learn more. In the mid-twentieth century, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results