Error detection and correction

Results: 1767



#Item
491Error detection and correction / MD5 / Hash function / SHA-1 / Collision resistance / Collision / One-way compression function / Cryptographic hash functions / Cryptography / Hashing

CS255: Cryptography and Computer Security Winter 2009 Assignment #2 Due: Wednesday, Feb. 18, 2009.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-02-10 00:34:43
492Error detection and correction / Probability and statistics / Bioinformatics / Hidden Markov model / Viterbi algorithm / Dynamic time warping / Markov chain / Speech recognition / Logarithm / Markov models / Statistics / Dynamic programming

publ. in Proc. of the 6th Int. Conf. on Document Analysis and Recognition (ICDAR) 2001, pp. 406–411, 2001. ftp://ftp.informatik.uni-freiburg.de/papers/lmb/ba_bu_icdar01.pdf Measuring HMM Similarity with the Bayes Proba

Add to Reading List

Source URL: lmb.informatik.uni-freiburg.de

Language: English - Date: 2012-06-18 23:39:44
493Hash function / Artificial intelligence / Information retrieval / Information science / Cryptographic hash functions / Regression analysis / Search algorithms / Hashing / Error detection and correction

Case Study 1: Estimating Click Probabilities Tackling  an  Unknown  Number  of   Features  with  Sketching     Machine  Learning  for  Big  Data       CSE547/STAT548,  

Add to Reading List

Source URL: courses.cs.washington.edu

Language: English - Date: 2015-04-06 19:08:06
494Artificial intelligence / Error detection and correction / Hash function / Hash table / Television advertisement / Cryptographic hash function / Search algorithms / Hashing / Information science

Practical Advertisement Detection in Video Du,Jiaen ([removed]) 1. Background Usually there are many advertisements in television. This is not efficient for video

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2010-12-14 03:20:21
495Hash function / Artificial intelligence / Information retrieval / Information science / Cryptographic hash functions / Regression analysis / Search algorithms / Hashing / Error detection and correction

Case Study 1: Estimating Click Probabilities Tackling  an  Unknown  Number  of   Features  with  Sketching     Machine  Learning  for  Big  Data       CSE547/STAT548,  

Add to Reading List

Source URL: courses.cs.washington.edu

Language: English - Date: 2015-04-07 15:32:58
496Error detection and correction / Enhanced Data Rates for GSM Evolution / Videotelephony / Computer memory / Broadcom / Puncturing / Link adaptation / General Packet Radio Service / Dynamic random-access memory / Electronic engineering / Computing / Electronics

T he BCM[removed]GSM /GPRS H a ndse t Ba se ba nd ASI C w it h I nt e gra t e d EDGE a nd M e dia Func t ions Nelson Sollenberger Li Fung Chang

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2013-07-27 23:41:00
497Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2013-12-11 18:35:17
498Mathematics / Discrete mathematics / Noisy-channel coding theorem / Typical set / Binary symmetric channel / Error detection and correction / Binary erasure channel / Entropy / Z-channel / Information theory / Coding theory / Information

Information Theory, Pattern Recognition and Neural Networks Part III Physics, January 2007 Please work on the following exercise before lecture 2. The weighing problem

Add to Reading List

Source URL: wol.ra.phy.cam.ac.uk

Language: English - Date: 2007-01-25 12:38:17
499Mathematics / Theoretical computer science / Information / Information theory / Computational complexity theory / List decoding / Concatenated error correction code / BCH code / Chernoff bound / Coding theory / Error detection and correction / Finite fields

On collusion-secure codes for copyright protection Hans Georg Schaathun Abstract With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprin

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-12-12 14:20:25
500Mathematics / Discrete mathematics / Noisy-channel coding theorem / Typical set / Binary symmetric channel / Error detection and correction / Entropy / Binary erasure channel / Z-channel / Information theory / Coding theory / Information

Information Theory, Pattern Recognition and Neural Networks Part III Physics, January 2008 Please work on the following exercise before lecture 2. The weighing problem You are given 12 balls, all equal in weight except

Add to Reading List

Source URL: wol.ra.phy.cam.ac.uk

Language: English - Date: 2008-02-13 08:28:05
UPDATE