Recent
![Acceleration in Fixed Point Iteration and Nesterov;s Gradient Method](https://writelatex.s3.amazonaws.com/published_ver/9471.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240717T174324Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240717/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=0a8f0327f5065606ddcbf49071cf78bae2383d36fcb1f6a549b49b85c9672ea6)
Acceleration in Fixed Point Iteration and Nesterov;s Gradient Method
A note on gradient-based optimization.
Jinxiong Zhang
![Requirements for Evaluating Proposals](https://writelatex.s3.amazonaws.com/published_ver/9506.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240717T174324Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240717/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=8817f7b2ad55efc00f9bd57e4df39795817f670c0b8aa4b7012db607d8e8431b)
Requirements for Evaluating Proposals
Student of Master of Science in Information Systems at Uganda Martyrs University
Abel Katongore
![¿Como Funciona el LaTeX?](https://writelatex.s3.amazonaws.com/published_ver/9207.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240717T174324Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240717/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=0743a94ca5270a978b54ef0ebcea72ca965f2098a27998a9557da718416cda34)
¿Como Funciona el LaTeX?
¿Como Funciona el LaTeX?
diana
![The Effects And Dangers Of Online Advertisements](https://writelatex.s3.amazonaws.com/published_ver/5506.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240717T174324Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240717/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=ac09af6066f4154ee32144234de1abdad5a82a26b4c0c4816ab8a6aab974f29c)
The Effects And Dangers Of Online Advertisements
Human life has developed in many aspects since the evolution of computer started. The main function of creating new technologies is to make human life easier. New technologies are being invented everyday which creates limitless opportunities for developers to make use of these technologies to serve a specific purpose or task. The Advertising used to be print paper or TV ads. Today mobile and online video creates new ways to contact with customers. Today Ads are kind of the most popular online advertising market in the world and trading ad spaces over the Internet. Currently the social online ads like Facebook and YouTube have some preferred set of users they wish to reach by showing their ads but some cases force the users to watch their Advertising. Ethan Zuckerman wad created the first pop-up advertising on the web was 15-Aug-2014. The pop-up advertising most using in the pc application and browser, and APPs for smartphone. The small internet windows that pop up on your screen can be useful, annoying or dangerous often used by advertisers to get your attention or by viruses to trick you into clicking on them. This guide gives them basic information about your identity. Some dangerous pop-up can leak your private information like your name, number, credit card member, and etc. In this paper we sum up, all these facts contribute to show how danger the pop-up advertising with developing new pop-up advertising to leak the user identity.
almokri
![LaTeX Assignment 4](https://writelatex.s3.amazonaws.com/published_ver/5544.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240717T174324Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240717/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=2c09da3344118a74828bbd34ca61fb9d1d272ff117235cdad593787510483792)
LaTeX Assignment 4
This was an assignment for a college physics course. Please let me know what you think! :)
Jonathan Guiang
![Kernel Improvement](https://writelatex.s3.amazonaws.com/published_ver/5070.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240717T174324Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240717/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=f16819f52805dc99259f998cebff2f192e1eff2caeb339ff81c73b4be3497d59)
Kernel Improvement
In this paper we try to make an improvement for the Linux kernel, by modifying kernel variables.
Daniel Contreras and Itzel Cordero
![The addition formulas for the hyperbolic sine and cosine functions via linear algebra](https://writelatex.s3.amazonaws.com/published_ver/4599.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240717T174324Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240717/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=f58ec13ac1822b4cd23ce65b8f178b45a5968985c0b233ae739fa59f3202a790)
The addition formulas for the hyperbolic sine and cosine functions via linear algebra
We present a geometric proof of the addition formulas for the hyperbolic sine and cosine functions, using elementary properties of linear transformations.
David Radcliffe
![SECURED SOFTWARE SYSTEMS](https://writelatex.s3.amazonaws.com/published_ver/10836.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240717T174324Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240717/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=bf1cea7d9376b600a2b20f2975a576ddab0bf4039ce62d080a15055ce8061f2c)
SECURED SOFTWARE SYSTEMS
Buffer overflow attacks, Integer overflow attacks and other forms of attack.
Biodoumoye George Bokolo
![Mise en route avec iceScrum Documentation: Les rôles, les équipes et les projets](https://writelatex.s3.amazonaws.com/published_ver/5534.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240717T174324Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240717/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=7ab7b6abf862a8b571bc0734c03cc1d815e69db46ae361865807a6720f539010)
Mise en route avec iceScrum Documentation: Les rôles, les équipes et les projets
Join me
Fouzi TAKELAIT