Error function

Results: 718



#Item
431Hashing / Cryptographic hash functions / Error detection and correction / Web search engine / Web crawler / Search engine indexing / Public-key cryptography / Hash function / Point location / Information science / Cryptography / Information retrieval

Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers Michael T. Goodrich Duy Nguyen

Add to Reading List

Source URL: vldb.org

Language: English - Date: 2012-06-29 06:35:47
432Measurement / Signal processing / Statistical inference / Sample size determination / Kriging / Loss function / Mean squared error / Estimation theory / Errors and residuals in statistics / Statistics / Statistical theory / Sampling

TEE EFFECTS OF SAMPLING DESIGN PARAMETERS ON BLOCK SELECTION

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2011-11-11 02:39:10
433Function / Coding theory / Error detection and correction / Mathematics / Information literacy / Information science

Library Scope and Sequence B.xls

Add to Reading List

Source URL: www.monet.k12.ca.us

Language: English - Date: 2007-10-10 12:54:44
434Geostatistics / Econometrics / Statistical theory / Kriging / Estimator / Mean squared error / Point estimation / Sampling / Loss function / Statistics / Estimation theory / Statistical inference

Evaluation and Comparison of Spatial Interpolators

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2011-11-11 02:43:04
435Ordinary differential equations / Partial differential equations / Heat equation / Mathematical analysis / Error function / Gaussian function

Manuscript Click here to download Manuscript: manuscript R1.doc Click here to view linked References 1 2 3

Add to Reading List

Source URL: www.ias.ac.in

Language: English - Date: 2014-05-09 08:02:36
436Search algorithms / Error detection and correction / Collision attack / Merkle–Damgård construction / Preimage attack / Hash function / Digital signature / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Hashing

Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
437Computing / Cryptographic hash functions / Information / Internet protocols / Internet standards / Hash tree / Hash list / Hash function / Transport Layer Security / Hashing / Error detection and correction / Cryptography

Merkle Tree Authentication of HTTP Responses Roberto J. Bayardo Jeffrey Sorensen IBM Almaden Research Center

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-04-05 14:58:32
438Differential calculus / Ordinary differential equations / Finite difference / Partial differential equation / Differential equation / Derivative / Equation solving / Truncation error / Differential of a function / Mathematical analysis / Calculus / Mathematics

U.S. DEPARTMENT OF COMMERCE NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION NATIONAL WEATHER SERVICE NATIONALMETEOROLOGICAL CENTER

Add to Reading List

Source URL: www.lib.ncep.noaa.gov

Language: English - Date: 2002-01-21 14:34:17
439Hashing / System software / Search algorithms / Data synchronization / Rsync / MD5 / Hash function / Andrew Tridgell / Rolling hash / Error detection and correction / Computing / Cryptographic hash functions

ManTech International Computer Forensics and Intrusion Analysis Fuzzy Hashing Jesse Kornblum

Add to Reading List

Source URL: jessekornblum.com

Language: English - Date: 2009-01-16 06:23:00
440Hashing / NIST hash function competition / MD5 / Hash function / HMAC / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-3 Competition - Round 2: Official Comments-BMW

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:12:20
UPDATE