Browsing by Subject
Showing results 814 to 833 of 2605
< previous
next >
- Braided monoidal category | Brauer–Picard group | Cohomology | Finite tensor category | Picard group 1
- Branch and bound | Metaheuristics | Primal-dual methods | Simple plant-location problem | Variable-neighborhood search 1
- Branching time logic | First order logic | Strong completeness 1
- Branching time | Probability operators | Propositional logic 1
- Branching | Broom graph | Chemical trees | Estrada index | Spectral moments | Volkmann trees 1
- Brauer algebras | Categories of proofs | Digraphs | Identity criteria for proofs | Representation 1
- Brauer categories | Diagram categories | Motzkin categories | Partition categories | Sandwich semigroups | Temperley-Lieb categories 1
- Brauerian representation | Cobordism | Coherence | Commutative Frobenius object | Normal form | Oriented manifold | Symmetric monoidal category | Topological quantum field theory 1
- Brauer–Picard group | Cohomology groups | Finite tensor category | Symmetric monoidal category 1
- Bredon's theorem | Graph complexes | WI-posets 1
- Brehm and Kühnel triangulations | combinatorial Alexander dual | combinatorial manifold | manifold like a projective plane | octonionic projective plane | Self-dual complex 1
- Brieskorn manifolds | Constraints | Contact systems | Hypersurfaces of contact type | Noncommutative integrability | Partial integrability 1
- Broadcast encryption | Cryptanalysis | Key management | Time-memory-data trade-off 1
- Broadcast encryption | Cryptographic keys management | One-way mappings | Pseudorandom number generators | Time-bound keys | Time-limited services 1
- Broadcast encryption | Erasure channels | Key management | One-way mapping | Pseudorandom number generators | System overheads trade-off 1
- Broadcast encryption | Heterogeneous structures | Key management | Reconfigurability | Stateless receivers | Time varying schemes | Tree graphs 1
- Broadcast encryption | Key management | Stateless receivers 1
- Broadcasting | Clustering | Distributed algorithms | Dominating sets | Wireless networks 1
- Broadcasting | Clustering | Dominating sets | Wireless networks 1
- Broadcasting | Conditional data access control | Cryptanalysis | Cryptographic key management | Time-memorydata trade-off 1