1

Automated teller machines: their history and authentication protocols

Year:
2016
Language:
english
File:
PDF, 2.39 MB
english, 2016
3

The Impetus to Creativity in Technology

Year:
2015
Language:
english
File:
PDF, 1.27 MB
english, 2015
6

Computer Security and Cryptography || The Japanese Cipher Machines

Year:
2007
Language:
english
File:
PDF, 3.14 MB
english, 2007
7

A Note on Order Statistics

Year:
1971
Language:
english
File:
PDF, 179 KB
english, 1971
8

A Generalized Independence Condition and Error Correction Codes

Year:
1960
Language:
english
File:
PDF, 433 KB
english, 1960
9

Topological Entropy

Year:
1965
Language:
english
File:
PDF, 261 KB
english, 1965
10

Finite Capacity Queuing Systems with Applications in Computer Modeling

Year:
1978
Language:
english
File:
PDF, 1.62 MB
english, 1978
13

4993

Year:
1963
Language:
english
File:
PDF, 251 KB
english, 1963
14

Extreme Points of the Unit Ball in a Space of Real Polynomials

Year:
1966
Language:
english
File:
PDF, 339 KB
english, 1966
17

4999

Year:
1963
Language:
english
File:
PDF, 274 KB
english, 1963
18

A Geometric Convergence Theorem for the Perceptron

Year:
1963
Language:
english
File:
PDF, 1012 KB
english, 1963
19

4961

Year:
1962
Language:
english
File:
PDF, 264 KB
english, 1962
20

Problem 60-11

Year:
1962
Language:
english
File:
PDF, 212 KB
english, 1962
21

Risk Communication in the Real World

Year:
1988
Language:
english
File:
PDF, 648 KB
english, 1988
22

E1493

Year:
1962
Language:
english
File:
PDF, 264 KB
english, 1962
23

E1458

Year:
1961
Language:
english
File:
PDF, 317 KB
english, 1961
24

An Occupancy Discipline and Applications

Year:
1966
Language:
english
File:
PDF, 609 KB
english, 1966
25

A Note on Order Statistics

Year:
1971
File:
PDF, 269 KB
1971
27

Numerical evaluation of Wiener integrals

Year:
1967
Language:
english
File:
PDF, 1.16 MB
english, 1967
28

Topological entropy

Year:
1965
Language:
english
File:
PDF, 911 KB
english, 1965
29

Processor-Sharing of Two Parallel Lines

Year:
1981
Language:
english
File:
PDF, 355 KB
english, 1981
30

Computational and probabilistic methods in cryptanalysis: the Kryha machine

Year:
1984
Language:
english
File:
PDF, 156 KB
english, 1984
31

E1480

Year:
1962
Language:
english
File:
PDF, 279 KB
english, 1962
32

The Organ Pipe Permutation

Year:
1984
Language:
english
File:
PDF, 985 KB
english, 1984
33

4958

Year:
1962
Language:
english
File:
PDF, 265 KB
english, 1962
34

5054

Year:
1963
Language:
english
File:
PDF, 297 KB
english, 1963
36

E1509

Year:
1962
Language:
english
File:
PDF, 105 KB
english, 1962
37

The Random Division of an Interval and the Random Covering of a Circle

Year:
1962
Language:
english
File:
PDF, 666 KB
english, 1962
38

The Random Division of an Interval and the Random Covering of a Circle

Year:
1962
Language:
english
File:
PDF, 687 KB
english, 1962
40

An Occupancy Discipline and Applications

Year:
1966
Language:
english
File:
PDF, 604 KB
english, 1966
42

Computer Security and Cryptography || Applications of Cryptography

Year:
2007
Language:
english
File:
PDF, 1.07 MB
english, 2007
43

Computer Security and Cryptography || Columnar Transposition

Year:
2007
Language:
english
File:
PDF, 1.45 MB
english, 2007
44

Waiting lines in multiple loop systems

Year:
1972
Language:
english
File:
PDF, 616 KB
english, 1972
45

Policing and traffic shaping at the user-network-interface (UNI)

Year:
1996
Language:
english
File:
PDF, 1.15 MB
english, 1996
46

A Note on Merging

Year:
1972
Language:
english
File:
PDF, 322 KB
english, 1972
47

Report of the Council Committee on Discrimination

Year:
1972
Language:
english
File:
PDF, 942 KB
english, 1972
48

An Extremum Problem (R. Tapir)

Year:
1973
Language:
english
File:
PDF, 144 KB
english, 1973
49

Computer Security and Cryptography || Monoalphabetic Substitution

Year:
2007
Language:
english
File:
PDF, 1.50 MB
english, 2007
50

Hashing in Computer Science (Fifty Years of Slicing and Dicing) || Basic Concepts of Cryptography

Year:
2010
Language:
english
File:
PDF, 827 KB
english, 2010