Standard algorithms

Results: 123



#Item
31Quality is One of Our Advantages! Sentry’s exclusive algorithms enable any standard Laserjet or Inkjet printer to produce fingerprints without pixels. This allows forensic examiners to see details and minutae not rende

Quality is One of Our Advantages! Sentry’s exclusive algorithms enable any standard Laserjet or Inkjet printer to produce fingerprints without pixels. This allows forensic examiners to see details and minutae not rende

Add to Reading List

Source URL: www.sentrykids.com

- Date: 2011-12-27 08:25:23
    32Towards a unification of waterfalls, standard and P algorithms Serge Beucher Center of Mathematical Morphology, Mines ParisTech JanuaryIntroduction

    Towards a unification of waterfalls, standard and P algorithms Serge Beucher Center of Mathematical Morphology, Mines ParisTech JanuaryIntroduction

    Add to Reading List

    Source URL: cmm.ensmp.fr

    Language: English - Date: 2012-01-18 07:54:03
    33UbiCrawler: A Scalable Fully Distributed Web Crawler Paolo Boldi∗ Bruno Codenotti†  Massimo Santini‡

    UbiCrawler: A Scalable Fully Distributed Web Crawler Paolo Boldi∗ Bruno Codenotti† Massimo Santini‡

    Add to Reading List

    Source URL: vigna.di.unimi.it

    Language: English - Date: 2003-10-19 11:16:51
    34PROTECTING STORED CARDHOLDER DATA (AN UNOFFICIAL SUPPLEMENT TO PCI DSS V3.0) Rob Chahin — rob[dot]chahin[at]nccgroup[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020

    PROTECTING STORED CARDHOLDER DATA (AN UNOFFICIAL SUPPLEMENT TO PCI DSS V3.0) Rob Chahin — rob[dot]chahin[at]nccgroup[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020

    Add to Reading List

    Source URL: www.isecpartners.com

    Language: English - Date: 2015-02-18 09:34:54
    35CIS 194: Homework 7 Due Wednesday, 25 March Figure 1: The Haskell logo is modelled after the bind function (>>=) in the Monad type class

    CIS 194: Homework 7 Due Wednesday, 25 March Figure 1: The Haskell logo is modelled after the bind function (>>=) in the Monad type class

    Add to Reading List

    Source URL: www.seas.upenn.edu

    Language: English - Date: 2015-04-22 09:29:17
    36I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms

    I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2003-12-17 08:53:09
    37Cloud screening and quality control algorithms for the AERONET database Automatic globally distributed networks for monitoring aerosol optical depth provide measurements of natural and anthropogenic aerosol loading impor

    Cloud screening and quality control algorithms for the AERONET database Automatic globally distributed networks for monitoring aerosol optical depth provide measurements of natural and anthropogenic aerosol loading impor

    Add to Reading List

    Source URL: uae2.gsfc.nasa.gov

    Language: English - Date: 2006-04-14 11:46:36
    38Verification and testing of mobile robot navigation algorithms: A case study in SPARK Piotr Trojanek and Kerstin Eder Abstract— Navigation algorithms are fundamental for mobile robots. While the correctness of the algo

    Verification and testing of mobile robot navigation algorithms: A case study in SPARK Piotr Trojanek and Kerstin Eder Abstract— Navigation algorithms are fundamental for mobile robots. While the correctness of the algo

    Add to Reading List

    Source URL: www.spark-2014.org

    Language: English - Date: 2014-08-20 15:36:18
    39IFREMER BREST  Optimization for MARS code Automatic MPI 2-D domain decomposition Luc Guéret

    IFREMER BREST Optimization for MARS code Automatic MPI 2-D domain decomposition Luc Guéret

    Add to Reading List

    Source URL: wwz.ifremer.fr

    Language: English
    40Recommendation for Space Data System Standards  CCSDS CRYPTOGRAPHIC ALGORITHMS RECOMMENDED STANDARD

    Recommendation for Space Data System Standards CCSDS CRYPTOGRAPHIC ALGORITHMS RECOMMENDED STANDARD

    Add to Reading List

    Source URL: public.ccsds.org

    Language: English - Date: 2012-11-15 20:57:43