Error function

Results: 718



#Item
551Cryptographic hash functions / Artificial intelligence / Information retrieval / Searching / Cryptography / Error detection and correction / Hash function

RADIOGATÚN, a belt-and-mill hash function Guido Bertoni, Joan Daemen, Michaël Peeters* and Gilles Van Assche STMicroelectronics

Add to Reading List

Source URL: radiogatun.noekeon.org

Language: English - Date: 2013-02-27 15:27:44
552One-way compression function / MD5 / Preimage attack / SHA-2 / SHA-1 / Merkle–Damgård construction / Collision attack / N-Hash / Birthday attack / Cryptography / Cryptographic hash functions / Error detection and correction

Microsoft PowerPoint - preneel_hash_tools_2012v2.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2012-05-31 19:52:41
553Expectation–maximization algorithm / Errors-in-variables models / Likelihood function / Sufficient statistic / M-estimator / Estimator / Normal distribution / Statistics / Estimation theory / Maximum likelihood

A Unified Approach to Measurement Error and Missing Data: Details and Extensions∗ Matthew Blackwell† James Honaker‡

Add to Reading List

Source URL: gking.harvard.edu

Language: English - Date: 2014-04-14 12:48:46
554Error detection and correction / Information retrieval / Artificial intelligence / Information science / Cryptography / Hash function / Merkle–Damgård construction / Hash tree / Tabulation hashing / Hashing / Cryptographic hash functions / Search algorithms

Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
555Conditionality principle / Statistical inference / Frequentist inference / Inference / Likelihood function / Bayesian statistics / Sufficient statistic / P-value / Causality / Statistics / Statistical theory / Likelihood principle

III An Error in the Argument from Conditionality and Sufficiency to the Likelihood Principle Deborah G. Mayo Cox and Mayo (7(II), this volume) make the following bold assertion: It is not uncommon to see statistics texts

Add to Reading List

Source URL: www.phil.vt.edu

Language: English - Date: 2011-05-11 00:02:45
556Hashing / Search algorithms / NIST hash function competition / Keccak / Hash function / Crypt / VEST / GOST / Tabulation hashing / Cryptography / Cryptographic hash functions / Error detection and correction

Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:42
557Watermark / Watermarking / Hash function / Digital signature / Cryptography / Error detection and correction / Electronic documents

Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document, or any portion ther

Add to Reading List

Source URL: www.crime-scene-investigator.net

Language: English - Date: 2011-10-28 14:25:01
558Medical terms / Healthcare / Health informatics / Medical diagnosis / Medical error / Medical prescription / Pharmacist / Adverse event / Over-the-counter drug / Medicine / Health / Patient safety

The Medication Error Prioritization System (MEPS): A Novel Tool in Medication Safety Alan Polnariev, PharmD, MS, CGP Medication administration is a high-risk core function in a health care setting involving multiple dis

Add to Reading List

Source URL: www.ptcommunity.com

Language: English - Date: 2014-06-07 18:41:25
559Cryptographic hash functions / Search algorithms / Information retrieval / Information science / Computing / Trie / Hash tree / Hash function / Padding / Hashing / Error detection and correction / Cryptography

S : a flexible coding for tree hashing Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2014-04-18 11:02:15
560Cryptographic hash functions / Keccak / Skein / JH / Grøstl / SHA-1 / SHA-2 / Advanced Encryption Standard / Crypt / Error detection and correction / NIST hash function competition / Cryptography

SHA-3 Conference, March 2012, Evaluation of Compact FPGA Implementations for All SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:04:20
UPDATE