Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy
 For more images, please select "images" in the filters.
Pdf
Computational model of human behavior in security games with varying number of targets
On þ-adic expansions of algebraic numbers
PDF
The class number formula
PDF
Computational transcranial magnetic stimulation (TMS)
PDF
Computation of class groups and residue class rings of function fields over finite fields
PDF
Number theory in cryptography
PDF
Quantum computation in wireless networks
PDF
Computational aspects of optimal information revelation
PDF
2T physics field theory and supersymmetry
PDF
User acceptance of computer-based VoIP phone service: an application of the technology acceptance model
PDF
Towards efficient fault-tolerant quantum computation
PDF
Asymetrical  discourse in a computer-mediated  environment
PDF
Models and algorithms for distributed computation in wireless sensor systems
PDF
Computation of algebraic system from self-assembly
PDF
Hybrid communication: a structurational analysis of computer gaming teams
PDF
Morse theory applied to surface topology sensing
PDF
Structured codes in network information theory
PDF
Pdf
Supergravity, string theory and black holes
Coded computing: Mitigating fundamental bottlenecks in large-scale data analytics
PDF
A treatise on cascaded computer generated holograms
PDF
Pdf
What is the relationship between self-efficacy of community college mathematics faculty and effective instructional practice?
Ubiquitous computing for human activity analysis with applications in personalized healthcare
PDF
Computational narrative models of character representations to estimate audience perception
PDF
Towards robust dynamical decoupling and high fidelity adiabatic quantum computation
PDF
Quantum computation and optimized error correction
PDF
of 120