Data redundancy

Results: 134



#Item
1Automatic identification and data capture / Identifiers / Privacy / Radio-frequency identification / Ubiquitous computing / Wireless / EPCglobal / Cyclic redundancy check / TIFF / Computing

Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard Pedro Peris-Lopez1 Tieyan Li2 Tong-Lee Lim2 Julio C. Hernandez-Castro1 Juan M. Estevez-Tapiador1 1 Computer

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:29:59
2Binary arithmetic / Finite fields / Computing / Mathematics / Data transmission / Error detection and correction / Cryptography / Cyclic redundancy checks / Linear-feedback shift register / Parity bit / Cksum / Polynomial code

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-15 08:13:39
3Smart cards / Computing / Answer to reset / Electromagnetism / Smart card application protocol data unit / ISO/IEC / EMV / Longitudinal redundancy check / Card reader / Technology / Control character / ASCII

GB-HA4) Printed on Oct 8, ’99 Data Transmission Specifications 3S4YR-MVFW(DL)-0** Series Hybrid Card Reader/Writer

Add to Reading List

Source URL: secdev.zoller.lu

Language: English - Date: 2009-02-23 10:28:26
4Data mining / Sampling / Survey methodology / Redundancy / Sequential pattern mining / Association rule learning

Randomly Sampling Maximal Itemsets Sandy Moens and Bart Goethals Frequent Itemset Mining •  Finding interesting patterns by e.g. support

Add to Reading List

Source URL: poloclub.gatech.edu

Language: English - Date: 2013-08-20 15:05:09
5Fault-tolerant computer systems / First-hop redundancy protocols / Internet protocols / Data synchronization / Routing protocols / Replication / Netfilter / Virtual Router Redundancy Protocol / Failover / Common Address Redundancy Protocol

Netfilter Failover Connection Tracking State Replication Krisztián Kovács <>

Add to Reading List

Source URL: people.netfilter.org

Language: English - Date: 2004-07-05 06:06:19
6Data management / NoSQL / MapReduce / Shard / Database / Scalability / NewSQL / Big data / Oracle NoSQL Database / Book:Databases // Theoretical Introduction

scalability redundancy & availability fast access Storage Device Characteristics

Add to Reading List

Source URL: bigdatascienceschool.com

Language: English - Date: 2016-06-06 18:10:05
7Ministry of Manpower / Singapore

PREFACE The “Singapore Yearbook of Manpower Statistics” contains a wide range of statistics on the labour market. These include key data on the labour force, job vacancy, wages, redundancy, labour turnover, hours wo

Add to Reading List

Source URL: stats.mom.gov.sg

Language: English
8Computing / Network architecture / Networking hardware / Computer networking / Internet protocols / 6WIND / Data Plane Development Kit / Open vSwitch / Virtual Router Redundancy Protocol / IPv6 / Network function virtualization / IPsec

S P E E DS E R I E S TurboAppliances Ÿ Throughput for cost-effec ve rou ng and

Add to Reading List

Source URL: www.6wind.com

Language: English - Date: 2016-03-01 18:42:38
9Finite fields / Mathematics / Cyclic redundancy checks / Polynomials / Coding theory / Binary arithmetic / Computation of cyclic redundancy checks / Mathematics of cyclic redundancy checks / CRC-based framing

Edgar H. Sibley Panel Editor Cyclic Redundancy Check (CRC) codes provide a simple yet powerful method of error detection during digital data transmission. Use of a table look-up in computing the CRC bits will efficiently

Add to Reading List

Source URL: www.ifp.illinois.edu

Language: English - Date: 2003-07-08 17:17:18
10Cryptography / Block cipher / Cipher / Encryption / Semantic security / Advantage / RSA / Data Encryption Standard / Feistel cipher / Optimal asymmetric encryption padding / Initialization vector

Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:50:20
UPDATE