Expander Graphs Based on GRH with an Application to Elliptic Curve Cryptography Expander Graphs Based on GRH with an Application to Elliptic Curve Cryptography by David Jao, University of Waterloo, Ontario and Stephen D. Miller, Rutgers University ... This Fools Your Vision | Two Minute Papers #241 (1) This Fools Your Vision | Two Minute Papers #241... Three Minute Thesis (3MT) 2015 QUT runner up/people’s choice winner – Ivano Bongiovanni, Business Ivano Bongiovanni, QUT Business School. His research looks at how we can improve the safety and security of airports, by reducing the risks of dangerous practices, attitudes and behaviours put in plac... Rony Atidia (Israel) - International FameLab Final 2010 Rony Atidia (Israel) - International FameLab Final 2010 - YouTube... On the p-adic completion of the units of a real abelian number field On the p-adic completion of the units of a real abelian number field by All, Timothy
from the Department of Mathematics
at The Ohio State University... B&B: Proteomic profiling of Bacillus licheniformis for the synthesis of polymers B&B: Proteomic profiling of Bacillus licheniformis for the synthesis of polymers - YouTube... TU Wien Rendering #8 - Surface Normals TU Wien Rendering #8 - Surface Normals - ... Created and maintained by Ryan Watkins (2013-present)
Mathematics
Computer Science
Education
Communications
Mathematics
Engineering
Computer Science