260 Hits in 2.9 sec

Page 2263 of Mathematical Reviews Vol. , Issue 87d [page]

1987 Mathematical Reviews  
Borgholm, 1983 Bréau-sans-Nappe, 1983 Bremen, 1984 Bristol, 1983 Buildings and the geometry of diagrams ..  ...  Abelian groups and modules Advances in cryptology—CRYPTO ’85 Advances in cryptology—-EUROCRYPT ’85 *20002 *94002 Advances in microlocal analysis *35005 Advances in nonlinear dynamics and stochastic processes  ... 

Page 2326 of Mathematical Reviews Vol. , Issue 2002C [page]

2002 Mathematical Reviews  
Sci 1983/1999 Inductive logic programming XL Mem. Mat.  ...  machines Adaptive method of lines nstrumentation Advanced topics in artificial intelligence Advances in artificial intelligence n classification and data analysis Advances in computing science—ASIAN'99 CRYPTO  ... 

Page 35 of Journal of Systems Management Vol. 35, Issue 1 [page]

1984 Journal of Systems Management  
PRESENT CRYPTO. Cryptography: A New Di- mension in Computer Data Security. A Guide for the Design and Implementation of Secure Systems by Carl Meyer and Stephen Matyas.  ...  Computer, February 1983. (10662 Los Vaqueros Circle, Los Alamitos CA 90720. Enquire) These 3 items reflect whatever state-of-the-art currently exists in data encryption.  ... 

Face recognition: the problem of compensating for changes in illumination direction

Y. Adini, Y. Moses, S. Ullman
1997 IEEE Transactions on Pattern Analysis and Machine Intelligence  
[83] HJ Beker, JMK Friend, PW Halliden, "Simplifying Key Management in Electronic Fund Transfer Point-of-Sale Systems," in Electronics Letters, v 19 (1983), pp 442-443.  ...  [70] J Bamford, The Puzzle Palace: A Report on NSA, America's Most Secret Agency, New York: Houghton-Mifflin (1982, 3rd printing, revised edition due out shortly), ISBN 0-395-31286-8.  ... 
doi:10.1109/34.598229 fatcat:ut5rztbqczda5hhukvfhz5d6ri

Face recognition: The problem of compensating for changes in illumination direction [chapter]

Yael Moses, Yael Adini, Shimon Ullman
1994 Lecture Notes in Computer Science  
[83] HJ Beker, JMK Friend, PW Halliden, "Simplifying Key Management in Electronic Fund Transfer Point-of-Sale Systems," in Electronics Letters, v 19 (1983), pp 442-443.  ...  [70] J Bamford, The Puzzle Palace: A Report on NSA, America's Most Secret Agency, New York: Houghton-Mifflin (1982, 3rd printing, revised edition due out shortly), ISBN 0-395-31286-8.  ... 
doi:10.1007/3-540-57956-7_33 fatcat:27ly57sy65fgpjyoy5zuvffrbm

The midgut ultrastructure of the endoparasite Xenos vesparum (Rossi) (Insecta, Strepsiptera) during post-embryonic development and stable carbon isotopic analyses of the nutrient uptake

Fabiola Giusti, Luigi Dallai, Laura Beani, Fabio Manfredini, Romano Dallai
2007 Arthropod structure & development  
(D) Cross section through the midgut epithelial cells of a 3rd instar larva.  ...  If female, the 3rd instar larva undergoes the last molt without a pupal stage.  ... 
doi:10.1016/j.asd.2007.01.001 pmid:18089098 fatcat:sob56nzg4zgdnouqnbkoxqmsle

Morphology of seeds and seedlings of four species of Vigna Savi (Leguminosae, Phaseolinae)

Fabiana Soledad Ojeda, Patricia Susana Hoc, María Teresa Amela García
2013 Acta Botânica Brasílica  
Crypto-hypogeal germination.  ...  According to Ye (1983) , the seedlings of Papilionoideae can be categorized by morphological type (Cinnamomum, Chimonanthus or Sophora).  ... 
doi:10.1590/s0102-33062013000300004 fatcat:rierqrwr4jgpdbjvkuxs5sy2ry

Primary cryptococcal pneumonia mimicking Pneumocystis carinii pneumonia in a patient with AIDS

A M Loerinc, E J Bottone, L J Finkel, A S Teirstein
1988 The Mount Sinai journal of medicine  
Infec- tious diseases, 3rd ed. Philadelphia: Harper & Row, 1983:1053—1061. 9. Rosen MJ, Tow TWY, Teirstein AS, Chuang MT, Mar- chevsky A, Bottone EJ.  ...  Arch Intern Med 1983; 143:1215—1220. Submitted for publication January 1987.  ... 
pmid:3260347 fatcat:mq4nx7abrbgnrh7warlcrbvnoa

Formulation and Preliminary Testing of a Cryptococcal Antibody Coated Latex Reagent Used with Protease Pre-Treatment

1991 Japanese Journal of Medical Mycology / Nihon Ishinkin Gakkai  
In 1983 Stockman and Roberts11) used a protease treatment to destroy interfering factors in the LA test.  ...  One, called crypto-latex, was sensitized with anti-cryptococcal globulin and used for the detection of antigen in sera or CSFs from patients with cryptococcosis.  ... 
doi:10.3314/jjmm.32.2supplement_83 fatcat:3554udr5nzgqjo7cslvtz3ypdi

Atlantis/Lyonesse (The plains of imagination)

Sheila Hallerton
2016 Shima  
It examines online crypto-historical accounts that have hypothesised that the city of Atlantis was located in close proximity to the area usually associated with Lyonesse and, separately, discusses the  ...  The Internet is a wonderfully sprawling repository of arcane fictions and crypto-everything.  ...  dimensions specified by germane to this research note as it is the online texts attributed to them that are the subject of my discussion. 2 Thanks to Oliver Smith for his discussion of this issue (pc 3rd  ... 
doi:10.21463/shima.10.2.11 fatcat:ko2t6j2fr5hkpmkzrdggkbxtoy

Page 4485 of Mathematical Reviews Vol. , Issue 88h [page]

1988 Mathematical Reviews  
Advances in cryptology—CRYPTO °86 .............  ...  Branch of the Academy of Sciences of the USSR ................ 01071 Oscillation, bifurcation and chaos ................... * 00006 Parametric optimization and related topics ......... * 90222 Paris, 1982/1983  ... 

Currency Stability Using Blockchain Technology

Bryan Routledge, Ariel Zetlin-Jones
2021 Journal of Economic Dynamics and Control  
A.1.2 Proof of Theorem 6 Incentives for the 3rd Trader.  ...  Period 0 exchange rates for the 3rd Trader. Suppose 2 traders have already arrived, θ of them have reported they are crypto-traders, and the government has R reserves outstanding.  ... 
doi:10.1016/j.jedc.2021.104155 fatcat:oopz6vvuzvf75fb3w2vclvuhjq

Reproductive ecology of Aegialitis rotundifolia Roxb., A crypto-viviparous mangrove plant species in Krishna mangrove forest, Andra Pradesh

Jacob Solomon Raju Aluri, Henry Jonathan Karyamsetty
2018 Transylvanian Review of Systematical and Ecological Research  
; Opler, 1983) .  ...  The stigma attains receptivity two hours after anthesis and continues up to the evening of the 3rd day.  ... 
doi:10.1515/trser-2018-0002 fatcat:47un2el76fbkzl7pvabt3pfyna

The crypto-christians of the Pontos and consul William Gifford Palgrave of Trebizond

Antony Bryer
1983 Bulletin of the Centre for Asia Minor Studies  
Lowry, Birmingham-Dumbarton Oaks 1983, forth coming. 15. R. M. Dawkins, «The Crypto-Christians of Turkey», Byzantion, 8 (1933), 274; cf. E.  ...  C. 1983 (forthcoming), sections xxviii and xxv.  ... 
doi:10.12681/deltiokms.35 fatcat:w4hgvimeffbh7kiji7aqtku3yq

Cryptographic analysis of the algorithm DES

Ganna Mamonova, Maryna Mednikova
2019 Modeling and Information Systems in Economics  
., 3rd year Student of the "Cybersecurity" speciality, Kyiv National Economic University named after Vadym Hetman КРИПТОГРАФІЧНИЙ АНАЛІЗ АЛГОРИТМУ DES CRYPTOGRAPHIC ANALYSIS OF THE ALGORITHM DES Анотація  ...  Keywords: DES, cybersecurity, crypto-stability, security, crypto-algorithm.  ...  Стандарт був переатестований у 1983, 1987 та 1993 роках без особливих проблеми.  ... 
doi:10.33111/mise.98.15 fatcat:jrhv2oedorc5pm4pqflvmyunmi
« Previous Showing results 1 — 15 out of 260 results