Error function

Results: 718



#Item
211Biometrics / Fingerprints / Search algorithms / Error detection and correction / Rabin fingerprint / Public key fingerprint / Hash function / Cryptographic hash function / SHA-1 / Cryptography / Information science / Information

WWWTrack: Data Mining Session: Similarity Search Detecting Near-Duplicates for Web Crawling Arvind Jain

Add to Reading List

Source URL: www2007.org

Language: English - Date: 2007-04-04 20:19:55
212Hash list / LOCKSS / Transmission Control Protocol / Localhost / Hash function / Computing / Network architecture / Information science / Error detection and correction / Cryptographic hash functions / Hashing

file:///tmp/voter-good.txt # Receive Poll message, create V3Voter to handle it 16:09:59.842: Debug: 3-V3Voter: ThreadId 3 is SCommRcv: TCP:[]::09:59.842: Debug3: 3-V3Voter: Creating V3 Voter for poll: H

Add to Reading List

Source URL: documents.clockss.org

Language: English - Date: 2014-07-21 13:42:30
213Physics / Physical quantities / Heat conduction / Thermodynamics / Thermal conductivity / Thermal conduction / Heat equation / Error function / Rate of heat flow / Heat transfer / Chemical engineering / Mechanical engineering

1 CHAPTER 4 THERMAL CONDUCTION 4.0 The Error Function Before we start this chapter, let’s just make sure that we are familiar with the error function erf a. We may need it during this chapter.

Add to Reading List

Source URL: orca.phys.uvic.ca

Language: English - Date: 2011-09-22 16:29:13
214Software testing / Predicate transformer semantics / Program logic / Fuzz testing / X Window System / Function / KeY / Errors and residuals in statistics / Network Time Protocol / Statistics / Software / Mathematics

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn Song Carnegie Mell

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
215Software testing / Error detection and correction / Software bugs / Abstract interpretation / Symbolic execution / Malware / Function / Hash function / Block cipher / Mathematics / Computing / Computer programming

Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware Juan Caballero Pongsin Poosankam

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
216Error detection and correction / Hash function / One-way compression function / Elliptic curve only hash / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-14 22:08:35
217Probability and statistics / Gaussian function / Error function / Importance sampling / Cumulative distribution function / Random variate / Markov chain Monte Carlo / Mathematical analysis / Monte Carlo methods / Statistics

An Improved Visible Normal Sampling Routine for the Beckmann Distribution Wenzel Jakob August 2, 2014 Recently, Heitz and D’Eonproposed a method for importance

Add to Reading List

Source URL: www.mitsuba-renderer.org

Language: English - Date: 2014-08-02 10:11:58
218Software testing / Error detection and correction / Software bugs / Abstract interpretation / Symbolic execution / Malware / Function / Hash function / Block cipher / Mathematics / Computing / Computer programming

Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware Juan Caballero Pongsin Poosankam

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
219Message authentication codes / Hashing / Hash function / MD5 / SHA-1 / Block cipher / Collision resistance / One-way compression function / CBC-MAC / Cryptography / Error detection and correction / Cryptographic hash functions

CS255: Cryptography and Computer Security Winter 2006 Assignment #2 Due: Wednesday, February 22nd, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-13 15:01:47
220Error detection and correction / Search algorithms / Cryptographic hash function / Hash function / Digital signature / Hash tree / RSA / Crypt / Cryptography / Public-key cryptography / Hashing

CS255: Cryptography and Computer Security Winter 2004 Assignment #4 Due: Friday, March 12th. No late days allowed.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-03-03 16:21:52
UPDATE