Software entropy

Results: 42



#Item
31Computer network security / Vulnerability database / Vulnerability / Social vulnerability / Firefox / Patch / Application security / Attack / Software / Cyberwarfare / Computer security

Software diversity: Security, Entropy and Game Theory Saran Neti Carleton University [removed] Anil Somayaji

Add to Reading List

Source URL: people.scs.carleton.ca

Language: English - Date: 2013-07-18 12:34:36
32Pseudorandom number generators / Cryptographic software / Cryptographic protocols / Secure Shell / Entropy / Key generation / OpenSSH / /dev/random / RSA / Cryptography / Public-key cryptography / Key management

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-10-08 05:05:54
33Physics / Software engineering / Isothermal process / Isochoric process / Adiabatic process / Isobaric process / Ideal gas / Entropy / J / Thermodynamic processes / Thermodynamics / Atmospheric thermodynamics

Ch 25 Problem Set 2 Answers Part A Work through the following problem, but nothing is to be turned in The First Law and Ideal Gases Derive the following expressions for the changes in various thermodynamic first law quan

Add to Reading List

Source URL: www.br.caltech.edu

Language: English - Date: 2014-04-23 12:58:28
34Reuse / Statistical theory / Randomness / Information theory / Code reuse / Entropy / Kolmogorov complexity / Component-based software engineering / Principle of maximum entropy / Statistics / Software engineering / Probability and statistics

Software Libraries and Their Reuse: Entropy, Kolmogorov Complexity, and Zipf’s Law ∗ [Extended Abstract] Todd L. Veldhuizen Open Systems Laboratory Indiana University Bloomington

Add to Reading List

Source URL: lcsd05.cs.tamu.edu

Language: English - Date: 2006-06-28 09:22:00
35KROB / Debug / Software / Fluid dynamics / Thermodynamic entropy / Computing / Isentropic process

WINGRIDDS v4[removed]This is to announce a new WINGRIDDS v4.8. This release contains some bug fixes to WINGRIDDS. The changes to WINGRIDDS are as follows:

Add to Reading List

Source URL: winweather.org

Language: English - Date: 2014-01-02 17:21:48
36Probability and statistics / Markov models / Information theory / Estimation theory / Philosophy of thermal and statistical physics / Entropy / Kullback–Leibler divergence / Hidden Markov model / Loss function / Statistics / Statistical theory / Software

Active Learning for Hidden Markov Models: Objective Functions and Algorithms Brigham Anderson Andrew Moore Department of Computer Science, Carnegie Mellon University, Pittsburgh, PA[removed]USA

Add to Reading List

Source URL: www.machinelearning.org

Language: English - Date: 2008-12-01 11:14:33
37Philosophy of thermal and statistical physics / Chemistry / State functions / Information theory / Non-equilibrium thermodynamics / Entropy / Software entropy / Second law of thermodynamics / Laws of thermodynamics / Thermodynamic entropy / Thermodynamics / Physics

"But our years will be complete only when they have all moved into the past"

Add to Reading List

Source URL: www.chart.ac.uk

Language: English - Date: 2013-10-07 09:29:17
38Pseudorandom number generators / Cryptographic software / Cryptographic protocols / Secure Shell / Entropy / Key generation / OpenSSH / /dev/random / RSA / Cryptography / Public-key cryptography / Key management

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Add to Reading List

Source URL: factorable.net

Language: English - Date: 2012-07-02 15:01:16
39Functional analysis / Unitary operators / Joseph Fourier / Convolution / Fourier transform / Laplace transform / Nuclear magnetic resonance / Distribution / Gaussian function / Mathematical analysis / Fourier analysis / Integral transforms

MaxEnt interface summary—January 1999 Maximum Entropy Data Consultants Ltd. (MEDC) supply specialist computer programs for data analysis. Company policy is to provide fully reliable top-of-the-range quality software. M

Add to Reading List

Source URL: www.maxent.co.uk

Language: English - Date: 1999-09-10 18:04:52
40Pseudorandom number generators / Cryptographic software / Cryptographic protocols / Secure Shell / Entropy / Key generation / OpenSSH / /dev/random / RSA / Cryptography / Public-key cryptography / Key management

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Add to Reading List

Source URL: www.factorable.net

Language: English - Date: 2012-07-02 15:01:16
UPDATE