Random search

Results: 189



#Item
141Hashing / Search algorithms / Random oracle / Preimage attack / Hash function / Collision resistance / SHA-1 / Oracle machine / Collision / Cryptography / Cryptographic hash functions / Error detection and correction

Microsoft Word - Scott Contini.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:08:36
142Search algorithms / Error detection and correction / Hash function / Random oracle / Oracle machine / Preimage attack / Elliptic curve only hash / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN To:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:10:52
143Mathematics / Decision theory / Game artificial intelligence / Search algorithms / Markov processes / Minimax / Random variable / Expected utility hypothesis / Expectiminimax tree / Game theory / Statistics / Probability and statistics

Utility Hal Daumé III Computer Science University of Maryland [removed] CS 421: Introduction to Artificial Intelligence

Add to Reading List

Source URL: www.umiacs.umd.edu

Language: English - Date: 2012-02-16 12:27:45
144Error detection and correction / Search algorithms / Random oracle / Hash tree / Hash function / Hash chain / Oracle machine / Hash list / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

Security Proofs for the BLT Signature Scheme Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present security proofs for the BLT signature scheme in the mode

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-04 03:31:48
145Text Retrieval Conference / Learning to rank / Feature selection / Random forest / Document retrieval / Search engine indexing / Feature / Information science / Information retrieval / Science

Cumulative Citation Recommendation: A Feature-aware Comparisons of Approaches Gebrekirstos G. Gebremeskel ∗ , Jiyin He∗ , Arjen P. de Vries∗ and Jimmy Lin† ∗ CWI, Amsterdam, The Netherlands

Add to Reading List

Source URL: www.umiacs.umd.edu

Language: English - Date: 2014-07-16 17:56:56
146Markov models / Mathematics / Crowdsourcing / PageRank / Reputation management / Search engine optimization / Tree / Connectivity / Random walk / Graph theory / Statistics / Link analysis

Querying Provenance for Ranking and Recommending Zachary G. Ives Andreas Haeberlen Tao Feng Computer and Information Science Department University of Pennsylvania {zives,ahae,fengtao}@cis.upenn.edu

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2012-05-21 12:35:11
147Search algorithms / Motion planning / Algorithm / Collision detection / Computer science / Rapidly-exploring random tree / Theoretical computer science / Applied mathematics / Mathematics

Asymptotically-optimal Path Planning for Manipulation using Incremental Sampling-based Algorithms Alejandro Perez Sertac Karaman Alexander Shkolnik Emilio Frazzoli Seth Teller Matthew R. Walter Abstract— A desirable pr

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2011-10-05 15:18:02
148Artificial intelligence / Mathematics / Applied mathematics / Rapidly-exploring random tree / Combinatorial optimization / Routing algorithms / Motion planning / A* search algorithm / Anytime algorithm / Search algorithms / Robot control / Theoretical computer science

In Proc. IEEE Int’l Conference on Robotics and Automation (ICRA), May[removed]Anytime Motion Planning using the RRT∗ Sertac Karaman Matthew R. Walter

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2011-02-12 07:51:47
149Search algorithms / Error detection and correction / Birthday attack / Hash function / Random oracle / One-way compression function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

2nd Cryptographic Hash Workshop[removed], Santa Barbara, California) How to Construct Double-Block-Length Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:51:10
150Classical mechanics / Differential topology / Robot control / Topology / Search algorithms / Rapidly-exploring random tree / Motion planning / Nonholonomic system / Boyer–Moore string search algorithm / Mathematics / Physics / Algebraic topology

Motion Planning For Steerable Needles in 3D Environments with Obstacles Using Rapidly-Exploring Random Trees and Backchaining Jijie Xu1 , Vincent Duindam2, Ron Alterovitz1,3 , and Ken Goldberg1,2 1. Department of IEOR, U

Add to Reading List

Source URL: ieor.berkeley.edu

Language: English - Date: 2008-07-03 19:37:35
UPDATE