1

Automated teller machines: their history and authentication protocols

Year:
2016
Language:
english
File:
PDF, 2.39 MB
english, 2016
3

The Impetus to Creativity in Technology

Year:
2015
Language:
english
File:
PDF, 1.27 MB
english, 2015
5

Computer Security and Cryptography || The Japanese Cipher Machines

Year:
2007
Language:
english
File:
PDF, 3.14 MB
english, 2007
6

A Generalized Independence Condition and Error Correction Codes

Year:
1960
Language:
english
File:
PDF, 433 KB
english, 1960
7

A Geometric Convergence Theorem for the Perceptron

Year:
1963
Language:
english
File:
PDF, 1012 KB
english, 1963
8

Problem 60-11

Year:
1962
Language:
english
File:
PDF, 212 KB
english, 1962
9

An Occupancy Discipline and Applications

Year:
1966
Language:
english
File:
PDF, 609 KB
english, 1966
10

Numerical evaluation of Wiener integrals

Year:
1967
Language:
english
File:
PDF, 1.16 MB
english, 1967
11

Processor-Sharing of Two Parallel Lines

Year:
1981
Language:
english
File:
PDF, 355 KB
english, 1981
12

Computational and probabilistic methods in cryptanalysis: the Kryha machine

Year:
1984
Language:
english
File:
PDF, 156 KB
english, 1984
13

The Random Division of an Interval and the Random Covering of a Circle

Year:
1962
Language:
english
File:
PDF, 666 KB
english, 1962
14

The Random Division of an Interval and the Random Covering of a Circle

Year:
1962
Language:
english
File:
PDF, 687 KB
english, 1962
15

An Occupancy Discipline and Applications

Year:
1966
Language:
english
File:
PDF, 604 KB
english, 1966
17

Computer Security and Cryptography || Applications of Cryptography

Year:
2007
Language:
english
File:
PDF, 1.07 MB
english, 2007
18

Computer Security and Cryptography || Columnar Transposition

Year:
2007
Language:
english
File:
PDF, 1.45 MB
english, 2007
19

Waiting lines in multiple loop systems

Year:
1972
Language:
english
File:
PDF, 616 KB
english, 1972
20

Policing and traffic shaping at the user-network-interface (UNI)

Year:
1996
Language:
english
File:
PDF, 1.15 MB
english, 1996
21

A Note on Merging

Year:
1972
Language:
english
File:
PDF, 322 KB
english, 1972
22

Computer Security and Cryptography || Monoalphabetic Substitution

Year:
2007
Language:
english
File:
PDF, 1.50 MB
english, 2007
23

Hashing in Computer Science (Fifty Years of Slicing and Dicing) || Basic Concepts of Cryptography

Year:
2010
Language:
english
File:
PDF, 827 KB
english, 2010
24

Computer Security and Cryptography || Statistical Tests

Year:
2007
Language:
english
File:
PDF, 226 KB
english, 2007
25

Hashing in Computer Science (Fifty Years of Slicing and Dicing) || Basic Concepts

Year:
2010
Language:
english
File:
PDF, 752 KB
english, 2010
26

A note on time sharing with preferred customers

Year:
1968
Language:
english
File:
PDF, 741 KB
english, 1968
27

Computer Security and Cryptography || Polyalphabetic Substitution

Year:
2007
Language:
english
File:
PDF, 900 KB
english, 2007
28

Hashing in Computer Science (Fifty Years of Slicing and Dicing) || Hash Functions

Year:
2010
Language:
english
File:
PDF, 712 KB
english, 2010
29

Computer Security and Cryptography || The Emergence of Cipher Machines

Year:
2007
Language:
english
File:
PDF, 3.94 MB
english, 2007
31

Service in a Loop System

Year:
1972
Language:
english
File:
PDF, 655 KB
english, 1972
32

A Note on Translation Invariants

Year:
1962
Language:
english
File:
PDF, 164 KB
english, 1962
33

Hashing in Computer Science (Fifty Years of Slicing and Dicing) || Karp-Rabin String Searching

Year:
2010
Language:
english
File:
PDF, 669 KB
english, 2010
34

Computer Security and Cryptography || Stream Ciphers

Year:
2007
Language:
english
File:
PDF, 905 KB
english, 2007
35

Computer Security and Cryptography || Block-Ciphers: Lucifer, DES, and AES

Year:
2007
Language:
english
File:
PDF, 1.46 MB
english, 2007
37

Hashing in Computer Science (Fifty Years of Slicing and Dicing) || The Uniform Hashing Model

Year:
2010
Language:
english
File:
PDF, 622 KB
english, 2010
38

The Number of Bisecting Strategies for the Game $\Gamma(N)$

Year:
1962
Language:
english
File:
PDF, 317 KB
english, 1962
39

The Number of Bisecting Strategies for the Game $\Gamma (N)$

Year:
1962
Language:
english
File:
PDF, 301 KB
english, 1962
40

Computer Security and Cryptography || Index

Year:
2007
Language:
english
File:
PDF, 56 KB
english, 2007
43

A Geometric Convergence Theorem for The Perceptron

Year:
1963
Language:
english
File:
PDF, 837 KB
english, 1963
44

Hashing in Computer Science (Fifty Years of Slicing and Dicing) || Record Chaining with Hash Tables

Year:
2010
Language:
english
File:
PDF, 902 KB
english, 2010
45

The Theory of Branching Processesby Theodore E. Harris

Year:
1965
Language:
english
File:
PDF, 241 KB
english, 1965
47

An Elementary Solution of the Queuing System G/G/1

Year:
1975
Language:
english
File:
PDF, 311 KB
english, 1975
48

A Parking Problem (M. S. Klamkin, D. J. Newman and L. Shepp)

Year:
1962
Language:
english
File:
PDF, 169 KB
english, 1962
50

Waiting Lines and Times in a System with Polling

Year:
1974
Language:
english
File:
PDF, 982 KB
english, 1974