熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 50 筆, 頁數 1 / 1
呈現:
Four Days
|
|||
West to Eden
|
|||
On Doubly-Efficient Interactive Proof Systems
An interactive proof system is called doubly-efficient if the prescribed prover strategy can be impl... more |
|||
Introduction to Property Testing
|
|||
Leah’’s Children
|
|||
Leah’’s Children
|
|||
Leah’’s Journey
|
|||
Studies in Complexity and Cryptography: Miscellanea on the Interplay Between Randomness and Computation
formally unpublished pieces were written by Oded Goldreich, some in collaboration with other scientists. The articles included...... more |
|||
Modern Cryptography, Probalistic Proofs and Pseudorandomness
You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay betwee... more |
|||
Property Testing: Current Research and Surveys
Property Testing is the study of super-fast (randomized) algorithms for approximate decision making.... more |
|||
P, NP, and NP-Completeness: The Basics of Computational Complexity
The focus of this book is the P-versus-NP Question and the theory of NP-completeness. It also provid... more |
|||
P, NP, and NP-Completeness
The focus of this book is the P-versus-NP Question and the theory of NP-completeness. It also provid... more |
|||
Foundations of Cryptography: Volume 2, Basic Applications
Cryptography is concerned with the conceptualization, definition, and construction of computing syst... more |
|||
Computational Complexity
This book offers a comprehensive perspective to modern topics in complexity theory, which is a centr... more |
|||
Foundations of Cryptography: Basic Tools
Cryptography is concerned with the conceptualization, definition and construction of computing syste... more |
|||
Theoretical Computer Science: Essays in Memory of Shimon Even
On May 1, 2004, the world of theoretical computer science su?ered a stunning loss: Shimon Even passe... more |
|||
Modern Cryptography, Probabilistic Proofs and Pseudorandomness
You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay betwee... more |
|||
Computational Complexity and Property Testing: On the Interplay Between Randomness and Computation
This volume contains a collection of studies in the areas of complexity theory and property testing.... more |
|||
Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali
|
|||
Providing Sound Foundations for Cryptography: On the work of Shafi Goldwasser and Silvio Micali
Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic... more |
|||
Bayesian Models of Perception and Action: An Introduction
"An introduction to constructing and reasoning with Bayesian (probabilistic) models of perceptual de... more |
|||
Guests of August
|
|||
The Paris Children: A Novel of World War 2
by the true story of one woman’s fight to survive during the 20th century’s darkest hour--World War II--Gloria Goldreich...... more |
|||
The Guests of August
|
|||
The Guests of August
|
|||
The Guests of August Lib/E
|
|||
Guests of August
|
|||
After Melanie
|
|||
After Melanie
A moving, emotionally powerful tale about the far-reaching impact of a child s death on a fragile ma... more |
|||
After Melanie
|
|||
After Melanie
|
|||
After Melanie Lib/E
|
|||
After Melanie
|
|||
計算復雜性
|
|||
The Bridal Chair
"In prose as painterly and evocative as Chagall’s own dazzling brushstrokes, Gloria Goldreich finely evokes one of the...... more |
|||
A Primer on Pseudorandom Generators
|
|||
Open Doors
|
|||
Dinner with Anna Karenina
|
|||
Dinner With Anna Karenina
|
|||
Dinner With Anna Karenina
|
|||
Foundations of Cryptography: A Primer
|
|||
Walking Home
|
|||
Foundations of Cryptography II: Basic Applications
|
|||
The Climate of Israel: Observation, Research and Application
This book describes and analyses various aspects of Israeli climate. This work also elucidates how b... more |
|||
密碼學基礎
|
|||
Foundations of Crytography
Cryptography is concerned with the conceptualization, definition and construction of computing syste... more |
|||
The 40 Greatest Jewish Stories Ever Told!: Ten Traditional Jewish Children’s Stories, Ten Best Jewish Children’s Stories, Ten
|
|||
Ten Traditional Jewish Children’s Stories
|
|||
10 Traditional Jewish Children’s Stories
|
|||
Leah’s Journey
|