Search
Now showing items 1-4 of 4
Reverse accumulation and implicit functions
(1998)
We begin by introducing a simple technique for using reverse accumulation the first derivatives of target functions which include in their construction the solution of systems of linear or nonlinear equations. In the linear ...
Binding bit patterns to real world entities
(1998)
Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principals who are authorized to ...