Error function

Results: 718



#Item
161Information / Error detection and correction / Comma-separated values / Text file / Hash function / SQL / Binary file / Computing / Computer file formats / Data

INTEGRATED CHALLAN CUM RETURN

Add to Reading List

Source URL: www.epfindia.com

Language: English
162Learning / Artificial neuron / Artificial neural network / Perceptron / Generalization error / Statistical classification / Supervised learning / Multilayer perceptron / Activation function / Neural networks / Cybernetics / Artificial intelligence

Artificial Neural Networks Examination, March 2005 Instructions There are SIXTY questions. (The pass mark is 30 out of 60.) For each question, please select a maximum of ONE of the given answers (either A, B, C, D or E).

Add to Reading List

Source URL: aass.oru.se

Language: English - Date: 2005-03-21 10:47:39
163Statistical inference / Failure / Reliability engineering / Exponential distribution / Confidence interval / Standard error / Maximum likelihood / Likelihood function / Normal distribution / Statistics / Survival analysis / Estimation theory

RELIABILITY ANALYSIS METHODS FOR CALIBRATION INTERVALS: ANALYSIS OF TYPE III CENSORED DATA1 Dennis H. Jackson, Ph.D. Naval Weapon Station, Seal Beach, Corona Annex Corona, CaliforniaHoward T. Castrup, Ph.D.

Add to Reading List

Source URL: www.isgmax.com

Language: English - Date: 2009-11-19 22:38:00
164Preimage attack / MD5 / SHA-2 / Hash function / SHA-1 / Hash table / Collision attack / Padding / Tiger / Cryptographic hash functions / Cryptography / Error detection and correction

Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
165Functional languages / Search algorithms / Data types / Error detection and correction / Hash function / MooTools / Set / ATS / Computing / Software engineering / Computer programming

Hash: Browser mootools Basics Full CheatSheet for JavascriptFramework mootools rev 1.2 by mediavrog.net/blog/

Add to Reading List

Source URL: mediavrog.net

Language: English - Date: 2008-06-11 19:41:00
166Source code / Subroutines / Cryptographic software / OpenSSL / Coccinelle / Python / Software bug / Main function / Printf format string / Computer programming / Computing / Software engineering

Finding Error Handling Bugs in OpenSSL using Coccinelle Julia Lawall∗ , Ben Laurie† , Ren´e Rydhof Hansen‡ , Nicolas Palix∗ and Gilles Muller§ ∗ University of Copenhagen, Email: {julia,npalix}@diku.dk † Goo

Add to Reading List

Source URL: pagesperso-systeme.lip6.fr

Language: English - Date: 2011-12-17 11:25:56
167Cryptography / Hash function / Cryptographic hash function / Hash chain / Artificial intelligence / Cyberwarfare / Applied mathematics / Hashing / Search algorithms / Error detection and correction

Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs John Kelsey and Bruce Schneier Counterpane Internet Security, Inc. 101 E. Minnehaha Pkwy Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
168Summary statistics / Hypothesis testing / Analysis of variance / Studentized range / Newman–Keuls method / Errors and residuals in statistics / Studentization / Quantile / Error function / Statistics / Statistical theory / Multiple comparisons

g01 – Simple Calculations on Statistical Data g01emc NAG C Library Function Document nag_prob_studentized_range (g01emc)

Add to Reading List

Source URL: www.softintegration.com

Language: English - Date: 2004-10-25 19:49:06
169Hash function / DICT / Dictionary / Parameter / Software engineering / Computing / Search algorithms / Dictionary software / Error detection and correction

Perl versiondocumentation - Search::Dict NAME Search::Dict - look - search for key in dictionary file SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:53:06
170SHA-2 / SHA-1 / Hash function / Preimage attack / MD5 / MD4 / RIPEMD / NIST hash function competition / One-way compression function / Cryptographic hash functions / Error detection and correction / Cryptography

Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-20 08:25:40
UPDATE