Search Constraints
« Previous |
41 - 50 of 89
|
Next »
Search Results
Select an image to start the slideshow
Efficient Algorithms for Finite Fields, with Applications in Elliptic Curve Cryptography
1 of 10
Resident Student Perceptions of On-Campus Living and Study Environments at the University of Namibia and their Relation to Academic Performance
2 of 10
Sequential Quadratic Programming-Based Contingency Constrained Optimal Power Flow
3 of 10
Comprehensibility, Overfitting and Co-Evolution in Genetic Programming for Technical Trading Rules
4 of 10
Portfolio Construction and Risk Management: Practical Issues and Examples
5 of 10
Updating XML Views of Relational Data
6 of 10
A Numerical Study of Globalizations of Newton-GMRES Methods
7 of 10
Homogenization of an elastic-plastic problem.
8 of 10
Instability in a Cold Atom Interferometer
9 of 10
Risk Measurement of Mortgage-Backed Security Portfolios via Principal Components and Regression Analyses
10 of 10