MATHEMATICAL LABORATORIES

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remote Laboratories versus Virtual and Real Laboratories

1 Zorica Nedic, University of South Australia, School of Electrical and Information Engineering, Mawson Lakes, S.A. 5095, [email protected] 2 Jan Machotka, University of South Australia, School of Electrical and Information Engineering, Mawson Lakes, S.A. 5095, [email protected] 3 Andrew Nafalski, University of South Australia, School of Electrical and Information Engineering, M...

متن کامل

Artificial Laboratories

A wide variety of mathematical and statistical software tools are available today, and the list grows daily. Means for representing and storing data and scientific information are likewise increasing, from sophisticated database and knowledge base technologies to high-speed, high-resolution graphics. Imagine a computing environment that couples all of these in a user-friendly way, using the bes...

متن کامل

Virtual Laboratories

At the frontier of most areas in science, computer simulations play a central role. The traditional division of natural science into experimental and theoretical investigations is now completely outdated. Instead, theory, simulation, and experimentation form three equally essential aspects, each with its own unique flavor and challenges. Yet, education in computational science is still lagging ...

متن کامل

RSA Laboratories

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." To learn the current status of any Internet-Draft, please check the "1id-abstracts.txt" listing contained in the Internet-Drafts Shadow D...

متن کامل

RSA Laboratories Bulletin #5

Introduction During 1996, a new attack on cryptographic devices was proposed by researchers at Bellcore. This attack depends on introducing errors into key-dependent cryptographic operations through physical intrusion. Soon after, the initial Bellcore work which focused on public-key techniques was extended and applied to secret-key encryption techniques. It also motivated a series of discussio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: School Science and Mathematics

سال: 1908

ISSN: 0036-6803

DOI: 10.1111/j.1949-8594.1908.tb01326.x