Differences
This shows you the differences between two versions of the page.
 
| Both sides previous revisionPrevious revisionNext revision | Previous revision | 
| playground:playground [2016/01/01 22:28]  –  wkt | playground:playground [2016/01/04 21:55] (current)  –  wkt | 
|---|
| ====== PlayGround ====== | ====== PlayGround ====== | 
 |  | 
| Blah [(:biblio:prog:Knuth-LCE-1985)] blah [(:biblio:prog:lions1977commentary)] and so it goes plus [(:biblio:prog:GangOfFour)] jhas iwkwjd.  | Blah [(:biblio:prog:KnuthLCE1985Donald Knuth, Jan 1985. [[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1056997|Deciphering a linear congruential encryption.]] //IEEE Transactions on Information Theory//, 31(1), IEEE, pp.49-52, ISSN 0018-9448.)] blah [(:biblio:prog:lions1977commentaryLions, J., 1977. //[[http://books.google.com/books?id=d3kkNAAACAAJ|A commentary on the Unix operating system.]]// University of New South Wales, Dept. of Computer Science.)] and so it goes plus [(:biblio:prog:GangOfFourErich Gamma, Richard Helm, Ralph Johnson, John Vlissides, 1994. //[[http://en.wikipedia.org/wiki/Design_Patterns|Design Patterns: Elements of Reusable Object-Oriented Software.]]// Reading, Mass.: Addison-Wesley, pp.395, ISBN 0-201-63361-2.)] jhas iwkwjd. As well, [(:biblio:prog:Knuth_LCE1985Donald Knuth, Jan 1985. [[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1056997|Deciphering a linear congruential encryption.]] //IEEE Transactions on Information Theory//, 31(1), IEEE, pp.49-52, ISSN 0018-9448.)].  | 
| As well, [(:biblio:prog:Knuth-LCE-1985)]. |   | 
|   | dfklsdfgl jsdfglksjdgsfglksjdg lsk sldfkj sldfkgj sdflkgj sdlfgkjsdlsdlk ldldkgjdlkgj dfgllllkfdjg slfgk sdfglsdgjsdlkg **jsldfgksdjfg** s //lkjfdlksdjfg// sfgsd hello[[http://www.tuhs.org|hhelleo]] lwkleu kdk | 
 |  | 
|   |   | 
| ~~REFNOTES~~ | ~~REFNOTES~~ | 
|   |  |