You might remember vaguely logarithms from high school math and such but what this suggests for us, the computer scientists, is that this is certainly a smarter, a faster algorithm.
你可能还会依稀记得,高中数学里的对数,这就给了我们这些计算机科学家们,一些启示,即,这种算法更智能,更迅速。
Advanced math — XSLT can perform basic arithmetic easily enough, but it doesn't support trigonometry, exponential functions, logarithms, or other more advanced mathematical operators and functions.
高等数学——XSLT在基本数学方面游刃有余,但它不支持三角学、指数函数、对数或其他更为高级的数学运算符及函数。
The other element of the equation, b, turns out to be directly related to T1. It is calculated from the relationship between the logarithms of the attack number, n, and the attack interval, Tn.
至于这个公式里的其他元素,b和T1直接相关,它由袭击次数n的对数和袭击间隔Tn的关系计算得出。
Logs base e (natural logarithms) appear in the calculation of compound interest, and numerous scientific and mathematical applications.
以e为底的对数(自然对数)出现在复合计算以及大量科学和数学应用程序中。
It was also programmed with subroutines for logarithms and trigonometry.
它也用编好的子程序计算对数和三角。
Same with logarithms, roots, transcendentals, and other fundamental mathematical representations that appear nearly everywhere.
同样的,对数,根,超越数,和其他到处出现的基本数学原理。
The model of double logarithms is the best in both simulating and predicting among all these models.
各模型中以双对数型模拟、推算效果最佳。
Based on the zero -knowledge proofs and the computational difficulty of computing discrete logarithms, a dynamic multiple secrets sharing scheme is proposed in this paper.
基于中国剩余定理,零知识证明与有限域上计算离散对数问题的困难性,提出了一种新的动态多秘密分享方案。
Ability to apply advanced mathematical concepts such as exponents, logarithms, quadratic equations, and permutations.
在工作中能运用高等数学概念,如指数,对数,二次方程序和排列。
In this paper, two schemes for digital signature with message recovery are presented. The security of these schemes is based on factorization and discrete logarithms.
本文设计了两种具有消息恢复的数字签名方案,其安全性都是基于因子分解问题和离散对数问题的。
In this paper, we present a new signature scheme with message recovery and the security of the scheme is based on both factorization and discrete logarithms.
本文设计一种新的具备消息自动恢复特性的数字签名方案,这种方案的安全性同时建立在因子分解和离散对数之上,并对这种方案进行了安全性分析。
I know a lot of logarithms and axioms, but not the language of love.
我认识很多的对数和公理,而不是语言的热爱。
It will be assumed that the reader is familiar with logarithms and trigonometric functions.
我们还希望读者能熟悉对数和三角函数。
In the problem of dynamic access control, we present a secure and efficient scheme, which is based on discrete logarithms and polynomial interpolation.
在用户层次结构的动态存取控制问题上,本文提出了一种安全有效的方案。
Integrating logarithms requires a topic that is usually taught in Calculus II and so we won't be integrating a logarithm in this class.
结合对数,通常需要一个教微积分第二,所以我们不会被集成在这个类对数的话题。
A new key authentication scheme was proposed. This new scheme is based on the intractability of elliptic discrete logarithms. The key is combination of password and private key.
本文利用椭圆曲线上离散对数难解问题,提出了一种新的密钥认证方案,密钥由用户口令和秘密密钥组成。
As with logarithms integrating inverse trig functions requires a topic usually taught in Calculus II and so we won't be integrating them in this class.
如同对数反三角函数功能整合需要一个主题通常讲授微积分第二,所以我们不会被他们融入这个类。
Make use of the database can logarithms according to carry on the concentrated control and managements, and pass organization and the contact of the datas that the data model means various data.
利用数据库可对数据进行集中控制和管理,并通过数据模型表示各种数据的组织以及数据间的联系。
The scheme is efficient and practical, and its security is based on the difficulty of computing ellipse curve discrete logarithms problem.
方案的安全性基于求解有限域上椭圆曲线离散对数的困难性。
The system has the function of proceeding data collecting from monitor and can auto analysis reports to the police, still requesting the logarithms according to proceed saving management etc.
系统功能在进行数据采集监测中具有自动分析报警等功能,还要求对数据进行存储管理等。
The system has the function of proceeding data collecting from monitor and can auto analysis reports to the police, still requesting the logarithms according to proceed saving management etc.
系统功能在进行数据采集监测中具有自动分析报警等功能,还要求对数据进行存储管理等。
应用推荐