Select Page
Number theoretic algorithms in cryptography

Number theoretic algorithms in cryptography

Number theoretic algorithms in cryptography Shi Bai, Steven D. Galbraith, Department of Mathematics Home • Archive for "Department of Mathematics" Modern public-key cryptography is about communication in the presence of adversaries, allowing users to...
Testing what cosmic inflation really predicts

Testing what cosmic inflation really predicts

Testing what cosmic inflation really predicts Layne Price, Department of Physics Home • Archive for "Department of Physics" Overview A period of accelerated expansion in the early universe has recently received outstanding support from precision...
BEAST, Bayesian evolutionary analysis sampling trees

BEAST, Bayesian evolutionary analysis sampling trees

BEAST, Bayesian evolutionary analysis sampling trees Alexei Drummond, Bioinformatics, Department of Computer Science Home • Archive for "Department of Computer Science" BEAST is a cross-platform program for Bayesian MCMC analysis of molecular sequences....
Processing structure-from-motion photogrammetry on the cluster

Processing structure-from-motion photogrammetry on the cluster

Processing structure-from-motion photogrammetry on the cluster Dr Jon Tunnicliffe, Lecturer, School of Environment Home • Archive for "Data Visualisation" Introduction and research The nature of earth surface processes analyses and simulation has...