AC-3 algorithm

Results: 74



#Item
61Digital typography / TeX / Typesetting / Macro programming languages / Desktop publishing software / LaTeX / Hyphenation algorithm / Macro / Shorthand / Software / Application software / Computing

Babel Version 3.9l[removed]Original author Johannes L. Braams

Add to Reading List

Source URL: mirror.aut.ac.nz

Language: English - Date: 2014-09-25 10:24:00
62Digital typography / TeX / Typesetting / Macro programming languages / Desktop publishing software / LaTeX / Hyphenation algorithm / Macro / Shorthand / Software / Application software / Computing

Babel Version 3.9l[removed]Original author Johannes L. Braams

Add to Reading List

Source URL: ctan.yazd.ac.ir

Language: English - Date: 2014-09-25 11:24:56
63Digital typography / TeX / Typesetting / Macro programming languages / Desktop publishing software / LaTeX / Hyphenation algorithm / Macro / Shorthand / Software / Application software / Computing

Babel Version 3.9l[removed]Original author Johannes L. Braams

Add to Reading List

Source URL: kambing.ui.ac.id

Language: English - Date: 2014-09-25 11:24:56
64Modular arithmetic / Error detection and correction / Luhn algorithm

Optimal ec-PIN Guessing Markus G. Kuhn Known: 12 offset digits from magnetic stripe: Offset 1: O1 = (O1,1 , O1,2 , O1,3 , O1,4 ) Offset 2: O2 = (O2,1 , O2,2 , O2,3 , O2,4 ) Offset 3: O3 = (O3,1 , O3,2 , O3,3 , O3,4 )

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-01-26 10:58:27
65Quantum information science / Information theory / Quantum computer / Quantum cryptography / Quantum information / Ion trap / Electron / Quantum algorithm / Trapped ion quantum computer / Theoretical computer science / Physics / Applied mathematics

PhD position in quantum technologies with trapped ions: Microwave quantum logic, University of Sussex, Brighton, UK A 3.5 year PhD position is available in the Ion Quantum Technology Group in the Department of Physics &

Add to Reading List

Source URL: www.sussex.ac.uk

Language: English - Date: 2014-06-17 06:44:14
66Search algorithms / Error detection and correction / Arrays / Data types / Primitive types / Iris recognition / Bit array / Locality-sensitive hashing / Nearest neighbor search / Computing / Information science / Information

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 2, JUNE[removed]A Fast Search Algorithm for a Large Fuzzy Database Feng Hao, John Daugman, and Piotr ZielinĀ“ski

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-05-22 07:32:52
67Software engineering / Constraint satisfaction / Mathematical optimization / Boolean satisfiability problem / Solver / Answer set programming / Constraint / Constraint logic programming / AC-3 algorithm / Constraint programming / Declarative programming / Theoretical computer science

Masterclass Modelling with Constraints Part 1: Introduction Alan M Frisch Artificial Intelligence Group

Add to Reading List

Source URL: www-users.cs.york.ac.uk

Language: English - Date: 2012-01-06 10:09:14
68Quantum information science / Information theory / Quantum computer / Quantum cryptography / Quantum information / Ion trap / Electron / Quantum algorithm / Trapped ion quantum computer / Theoretical computer science / Physics / Applied mathematics

PhD position in quantum technologies with trapped ions: Microwave quantum logic, University of Sussex, Brighton, UK A 3.5 year PhD position is available in the Ion Quantum Technology Group in the Department of Physics &

Add to Reading List

Source URL: www.sussex.ac.uk

Language: English - Date: 2014-06-17 12:14:08
69Data Encryption Standard / Symmetric-key algorithm / Cryptography / Ciphertext / Cipher

2008 Paper 3 Question 8 Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:47
70Ciphertext / Cipher / Feistel cipher / Symmetric-key algorithm / Cryptography / Block cipher modes of operation / Block cipher

2002 Paper 3 Question 2 Introduction to Security (a) (i ) Explain the collision resistance requirement for the hash function used in a digital signature scheme. [4 marks]

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:36
UPDATE