منابع مشابه
Ocultamiento de Errores Espacial Mediante Curvas de Bezier
Rogelio Hasimoto-Beltrán and Ashfaq A. Khokhar 1 Centro de Investigación en Matemáticas – CIMAT Jalisco s/n, Col. Mineral de Valenciana, Guanajuato, Gto., México 36240 Tel: +52-(473)-732-7155 ext. 49636, Fax: +52-(473)-732-5749 [email protected] 2 University of Illinois at Chicago, Departments of Computer Sciences and Electrical and Computer Engineering, 851 South Morgan Street, Chicago, IL 606...
متن کاملDiagnóstico electroencefalográfico de las epilepsias generalizadas idiopáticas de la infancia
Introduction. The idiopathic generalized epilepsies of childhood form a heterogeneous group of epileptic syndromes, with certain clinical and electroencephalographic characteristics in common. From the onset, the seizures affect both cerebral hemispheres with generalized clinical expression and from the start there are bilateral electroencephalographic patterns during seizures. These epilepsies...
متن کاملInvariantes conformes de curvas a través de la conexión de Fermi–Walker
Partiendo de la teoŕıa desarrollada en la tesis “Paralelismo y geodésicas en variedades conformes” [5], se utiliza la conexión de Fermi–Walker y el tensor conforme de Schouten para describir los invariantes conformes clásicos asociados a curvas en el espacio conforme plano R. En particular, estos resultados se aplican al estudio de dos ejemplos especiales de curvas: los ćırculos y las hélices. ...
متن کاملTelesto: Indexação de Séries Temporais por Meio de Árvores de Sufixo Generalizadas
A time series is a collection of measurements made sequentially over time. Time series appear in various application such as finance, marketing, agriculture, weather and industrial and scientific data gathering. Similarity searching over time series databases is an important tool to extract knowledge. In this paper, we propose Telesto, a novel indexing technique aimed at time series similarity ...
متن کاملCriptografia com Curvas Elípticas
This paper presents an overview of the use of elliptic curves in cryptography. The security of this cryptosystem is based on the discrete logarithm problem, which appears to be much harder compared to the discrete logarithm problem in other cryptosystems. An overview of common cryptosystems is given, such as Diffie-Hellman and RSA, and an elliptic curve cryptography scheme is discussed. -------...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ciência e Natura
سال: 2014
ISSN: 2179-460X,0100-8307
DOI: 10.5902/2179460x12682