The Internet Archive has digitized a microfilm copy of this work. It may be possible to borrow a copy for reading.
Filters
Page 2263 of Mathematical Reviews Vol. , Issue 87d
[page]
1987
Mathematical Reviews
Borgholm, 1983
Bréau-sans-Nappe, 1983
Bremen, 1984
Bristol, 1983
Buildings and the geometry of diagrams .. ...
Abelian groups and modules Advances in cryptology—CRYPTO ’85 Advances in cryptology—-EUROCRYPT ’85
*20002 *94002
Advances in microlocal analysis *35005 Advances in nonlinear dynamics and stochastic processes ...
Page 2326 of Mathematical Reviews Vol. , Issue 2002C
[page]
2002
Mathematical Reviews
Sci 1983/1999 Inductive logic programming
XL Mem. Mat. ...
machines Adaptive method of lines
nstrumentation Advanced topics in artificial intelligence Advances in artificial intelligence n classification and data analysis Advances in computing science—ASIAN'99 CRYPTO ...
Page 35 of Journal of Systems Management Vol. 35, Issue 1
[page]
1984
Journal of Systems Management
PRESENT CRYPTO. Cryptography: A New Di- mension in Computer Data Security. A Guide for the Design and Implementation of Secure Systems by Carl Meyer and Stephen Matyas. ...
Computer, February 1983. (10662 Los Vaqueros Circle, Los Alamitos CA 90720. Enquire) These 3 items reflect whatever state-of-the-art currently exists in data encryption. ...
Face recognition: the problem of compensating for changes in illumination direction
1997
IEEE Transactions on Pattern Analysis and Machine Intelligence
[83] HJ Beker, JMK Friend, PW Halliden, "Simplifying Key Management in Electronic
Fund Transfer Point-of-Sale Systems," in Electronics Letters, v 19 (1983),
pp 442-443. ...
[70] J Bamford, The Puzzle Palace: A Report on NSA, America's Most Secret Agency,
New York: Houghton-Mifflin (1982, 3rd printing, revised edition due out shortly),
ISBN 0-395-31286-8. ...
doi:10.1109/34.598229
fatcat:ut5rztbqczda5hhukvfhz5d6ri
Face recognition: The problem of compensating for changes in illumination direction
[chapter]
1994
Lecture Notes in Computer Science
[83] HJ Beker, JMK Friend, PW Halliden, "Simplifying Key Management in Electronic
Fund Transfer Point-of-Sale Systems," in Electronics Letters, v 19 (1983),
pp 442-443. ...
[70] J Bamford, The Puzzle Palace: A Report on NSA, America's Most Secret Agency,
New York: Houghton-Mifflin (1982, 3rd printing, revised edition due out shortly),
ISBN 0-395-31286-8. ...
doi:10.1007/3-540-57956-7_33
fatcat:27ly57sy65fgpjyoy5zuvffrbm
The midgut ultrastructure of the endoparasite Xenos vesparum (Rossi) (Insecta, Strepsiptera) during post-embryonic development and stable carbon isotopic analyses of the nutrient uptake
2007
Arthropod structure & development
(D) Cross section through the midgut epithelial cells of a 3rd instar larva. ...
If female, the 3rd instar larva undergoes the last molt without a pupal stage. ...
doi:10.1016/j.asd.2007.01.001
pmid:18089098
fatcat:sob56nzg4zgdnouqnbkoxqmsle
Morphology of seeds and seedlings of four species of Vigna Savi (Leguminosae, Phaseolinae)
2013
Acta Botânica Brasílica
Crypto-hypogeal germination. ...
According to Ye (1983) , the seedlings of Papilionoideae can be categorized by morphological type (Cinnamomum, Chimonanthus or Sophora). ...
doi:10.1590/s0102-33062013000300004
fatcat:rierqrwr4jgpdbjvkuxs5sy2ry
Primary cryptococcal pneumonia mimicking Pneumocystis carinii pneumonia in a patient with AIDS
1988
The Mount Sinai journal of medicine
Infec-
tious diseases, 3rd ed. Philadelphia: Harper & Row, 1983:1053—1061.
9. Rosen MJ, Tow TWY, Teirstein AS, Chuang MT, Mar- chevsky A, Bottone EJ. ...
Arch Intern Med 1983; 143:1215—1220.
Submitted for publication January 1987. ...
pmid:3260347
fatcat:mq4nx7abrbgnrh7warlcrbvnoa
Formulation and Preliminary Testing of a Cryptococcal Antibody Coated Latex Reagent Used with Protease Pre-Treatment
1991
Japanese Journal of Medical Mycology / Nihon Ishinkin Gakkai
In 1983 Stockman and Roberts11) used a protease treatment to destroy interfering factors in the LA test. ...
One, called crypto-latex, was sensitized with anti-cryptococcal globulin and used for the detection of antigen in sera or CSFs from patients with cryptococcosis. ...
doi:10.3314/jjmm.32.2supplement_83
fatcat:3554udr5nzgqjo7cslvtz3ypdi
Atlantis/Lyonesse (The plains of imagination)
2016
Shima
It examines online crypto-historical accounts that have hypothesised that the city of Atlantis was located in close proximity to the area usually associated with Lyonesse and, separately, discusses the ...
The Internet is a wonderfully sprawling repository of arcane fictions and crypto-everything. ...
dimensions specified by germane to this research note as it is the online texts attributed to them that are the subject of my discussion. 2 Thanks to Oliver Smith for his discussion of this issue (pc 3rd ...
doi:10.21463/shima.10.2.11
fatcat:ko2t6j2fr5hkpmkzrdggkbxtoy
Page 4485 of Mathematical Reviews Vol. , Issue 88h
[page]
1988
Mathematical Reviews
Advances in cryptology—CRYPTO °86 ............. ...
Branch of the Academy of Sciences of the USSR ................ 01071 Oscillation, bifurcation and chaos ................... * 00006 Parametric optimization and related topics ......... * 90222 Paris, 1982/1983 ...
Currency Stability Using Blockchain Technology
2021
Journal of Economic Dynamics and Control
A.1.2 Proof of Theorem 6 Incentives for the 3rd Trader. ...
Period 0 exchange rates for the 3rd Trader. Suppose 2 traders have already arrived, θ of them have reported they are crypto-traders, and the government has R reserves outstanding. ...
doi:10.1016/j.jedc.2021.104155
fatcat:oopz6vvuzvf75fb3w2vclvuhjq
Reproductive ecology of Aegialitis rotundifolia Roxb., A crypto-viviparous mangrove plant species in Krishna mangrove forest, Andra Pradesh
2018
Transylvanian Review of Systematical and Ecological Research
; Opler, 1983) . ...
The stigma attains receptivity two hours after anthesis and continues up to the evening of the 3rd day. ...
doi:10.1515/trser-2018-0002
fatcat:47un2el76fbkzl7pvabt3pfyna
The crypto-christians of the Pontos and consul William Gifford Palgrave of Trebizond
1983
Bulletin of the Centre for Asia Minor Studies
Lowry, Birmingham-Dumbarton Oaks 1983, forth coming. 15. R. M. Dawkins, «The Crypto-Christians of Turkey», Byzantion, 8 (1933), 274; cf. E. ...
C. 1983 (forthcoming), sections xxviii and xxv. ...
doi:10.12681/deltiokms.35
fatcat:w4hgvimeffbh7kiji7aqtku3yq
Cryptographic analysis of the algorithm DES
2019
Modeling and Information Systems in Economics
., 3rd year Student of the "Cybersecurity" speciality, Kyiv National Economic University named after Vadym Hetman КРИПТОГРАФІЧНИЙ АНАЛІЗ АЛГОРИТМУ DES CRYPTOGRAPHIC ANALYSIS OF THE ALGORITHM DES Анотація ...
Keywords: DES, cybersecurity, crypto-stability, security, crypto-algorithm. ...
Стандарт був переатестований у 1983, 1987 та 1993 роках без особливих проблеми. ...
doi:10.33111/mise.98.15
fatcat:jrhv2oedorc5pm4pqflvmyunmi
« Previous
Showing results 1 — 15 out of 260 results