Brute

Results: 236



#Item
11Mathematics / Statistics / Applied mathematics / Data mining / Search algorithms / Approximation algorithms / Discrete geometry / Nearest neighbor search / Numerical analysis / Hierarchical clustering / Cluster analysis / K-means clustering

Fast Hierarchical Clustering and Other Applications of Dynamic Closest Pairs David Eppstein∗ Abstract dynamic closest pair problem. It can be solved by brute force 2 We develop data structures for dynamic closest pair

Add to Reading List

Source URL: bioinfo.ict.ac.cn

Language: English - Date: 2014-11-28 11:05:21
12

DESINFECTION PAR UV Les générateurs Culligan des gammes UVB et UVBP permettent : • la potabilisation d’eau brute provenant de ressources locales (puits, forages, captages,…)

Add to Reading List

Source URL: media.energie-industrie.com

Language: French - Date: 2016-05-31 04:13:30
    13Computer access control / Obfuscation / Computer security / Cryptography / Password / Security / Brute-force attack / Password policy / Password psychology

    Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-08-21 11:38:22
    14Computer access control / Computer security / Security / Cryptography / CAPTCHA / Password / Challengeresponse authentication / Transaction authentication number / Brute-force attack / Salt / Authentication / Password cracking

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-06-22 08:29:01
    15Cryptography / Key management / Public-key cryptography / Internet Standards / Internet protocols / Domain Name System Security Extensions / Key / Brute-force attack / Cryptanalysis / Domain Name System / Encryption / Entropy

    DNSSEC Key Maintenance Analysis_final

    Add to Reading List

    Source URL: www.nlnetlabs.nl

    Language: English - Date: 2009-06-27 06:07:09
    16

    • prévoir et gérer la marge commerciale et la marge nette du secteur; administration des ventes • commercial en tenant compte de : - de la marge brute, de la ristourne, des remises, des coûts de transport,

    Add to Reading List

    Source URL: www.securimer.com

    Language: French - Date: 2011-11-23 16:08:37
      17

      PROCÉDURE CANADIENNE DE MESURE DE LA MASSE BRUTE VÉRIFIÉE DE CONTENEURS EMPOTÉS CONFORMÉMENT À LA RÈGLE 2 DU CHAPITRE VI DE LA CONVENTION SOLAS - TPEntrée en vigueur le 1er juilletCONTEXTE

      Add to Reading List

      Source URL: www.port-montreal.com

      Language: French - Date: 2016-08-11 15:42:20
        18Computer network security / NT LAN Manager / Kerberos / Integrated Windows Authentication / Authentication protocol / Challengeresponse authentication / Password / Cain and Abel / Key distribution center / Electronic authentication / Brute-force attack / Pass the hash

        Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

        Add to Reading List

        Source URL: hdm.io

        Language: English - Date: 2015-12-05 20:38:27
        19Compiler optimizations / Search algorithms / Arrays / Global value numbering / Static single assignment form / Hash function / Hash table / Algorithm / Lookup table / Congruence

        This talk is divided into 7 parts. Part 1 begins with a quick look at the SSA optimization framework and global value numbering. Part 2 describes a well known brute force algorithm for GVN. Part 3 modifies this to arriv

        Add to Reading List

        Source URL: www.sable.mcgill.ca

        Language: English - Date: 2009-03-09 09:18:56
        20NP-complete problems / Computational complexity theory / Analysis of algorithms / Operations research / NP-hard problems / Vertex cover / Travelling salesman problem / Dynamic programming / Parameterized complexity / Independent set / Algorithm / 2-satisfiability

        CS261: A Second Course in Algorithms Lecture #19: Beating Brute-Force Search∗ Tim Roughgarden† March 8, 2016 A popular myth is that, for N P -hard problems, there are no algorithms with worst-case running time better

        Add to Reading List

        Source URL: theory.stanford.edu

        Language: English - Date: 2016-03-15 10:47:56
        UPDATE