×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [compute c]
Home >
compute c
Encryption
392 views
12 symmetric key cryptography
1.129 views
cvpr2009 tutorial: kernel methods in computer vision: part II: Statistics and Clustering with Kernels, Structured Output Learning
862 views
CCS’09: Smart Identity Card - Thomas Gross
717 views
PET504E Lecture 5 Spring 2015
5 views
1 Machine Learning: Lecture 9 Rule Learning / Inductive Logic Programming / Association Rules.
230 views
GPU Processing for Distributed Live Video Database Jun Ye
[email protected]
Data Systems Group.
220 views
Repetition Control Structure Lecture 5. Repetition using the DOWHILE structure Three different ways that a set of instruction can be repeated: 1.Beginning.
218 views
Foundations of Network and Computer Security J J ohn Black Lecture #11 Oct 4 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
216 views
95-702 Distributed Systems1 Lecture 12: RSA. 95-702 Distributed Systems2 Plan for today: Introduce RSA and a toy example using small numbers. This is.
215 views
Foundations of Network and Computer Security J J ohn Black Lecture #13 Sep 26 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
220 views
Vectors Vectors and Scalars Vector: Quantity which requires both magnitude (size) and direction to be completely specified –2 m, west; 50 mi/h, 220 o.
224 views
Next >