Sir William Thomson says he was the first to apply the absolute methods of measurement introduced by Gauss and Weber.
"Heroes of the Telegraph" by J. Munro
In mathematics do you look upon Euler, Laplace, or Gauss as fools?
"Virgin Soil" by Ivan S. Turgenev
Its ship, the Gauss, had been built at Kiel with the Fram as a model.
"The South Pole, Volumes 1 and 2" by Roald Amundsen
To the American reader the name of Karl Friedrich Gauss may have an unfamiliar sound.
"Notable Events of the Nineteenth Century" by Various
Gauss in 1822 used the reflection of the sun's image from a plane mirror and Drummond also tried this means.
"Artificial Light" by M. Luckiesh
Gauss, I, 86, 107, 310.
"A Budget of Paradoxes, Volume II (of II)" by Augustus de Morgan
In Linnaeus and Cuvier the intuitive element predominates; in Gauss, the analytical element.
"Essay on the Creative Imagination" by Th. Ribot
This information was available to Gauss, and the problem which he had to solve may be thus stated.
"The Story of the Heavens" by Robert Stawell Ball
It was in this extremity that the celebrated mathematician Gauss came to the rescue.
"A Popular History of Astronomy During the Nineteenth Century" by Agnes M. (Agnes Mary) Clerke
Its distance from the sun as determined by Gauss was 2.767 times the earth's distance.
"Pioneers of Science" by Oliver Lodge
The mysterious Gauss cyber-surveillance malware has experts stumped.
Gauss malware, Apple iPhone show what encryption can do.
The security firm last week uncovered Gauss , a cyber threat targeting users in the Middle East that is intended to steal personal details, like banking information.
Gauss Cyber-Spy Trojan Gives Rise to Many Theories, No Answers.
The Gauss malware installs a custom font called Palida Narrow.
Gauss Malware Detected Through Unique Palida Narrow Font.
The free tools look for the mysterious Palida Narrow font, which is unique to the Gauss malware and is installed when a system is infected.
Gauss Online Detection Tools Offered by Kaspersky, CrySys.
Researchers at Kaspersky Lab have teamed up with Hungarian research lab CrySyS for an online tool that detects if your device is infected with Gauss malware.
Kaspersky Finds New Malicious Software Gauss in Mideast.
FBI Tattoo Database, West Nile Epidemic, Kaspersky Lab Discovers Gauss , and More.
According to Kaspersky, Gauss includes characteristics not found in any previously discovered cyber weapons.
Code from the Gauss virus, a new cyberweapon that attacks bank accounts.
Researchers Uncover ' Gauss ,' A Stealthy Banking Trojan Likely Created By The US Government.
Rosenstiehl, "On the Gauss Crossing Problem," Colloquia Math .
The corresponding kernel can be expressed in terms of the Gauss hypergeometric function and is called the hypergeometric kernel.
Determinantal random point fields
Note that we retain some quantities — in particular J +−i and J +ij — which vanish at ﬁnite N (by the Gauss constraint and antisymmetry of F ij , respectively).
M(atrix) Theory: Matrix Quantum Mechanics as a Fundamental Theory
Then D = D ′ + D ′′ can be identiﬁed with the Gauss-Manin connections of the associated local system.
Higgs Bundles and Four Manifolds
Then letting I = J J (J ) we have that L lifts to a nonsingular foliation on the blowup B lI (V ), which is the same as the Gauss blowup ^B lJ (V ) of the variety B lJ (V ) along L.
On Resolving Singularities
It is shown that the very tail of pN (x) has a Gaussian form if and only if all the random terms are distributed according to the Gauss Law.
Tails of probability density for sums of random independent variables