Brute

Results: 236



#Item
81Field-programmable gate array / Xilinx / Symmetric-key algorithm / Key / Public-key cryptography / Block cipher / Brute-force attack / Partial re-configuration / Cryptography / Key management / Reconfigurable computing

Appears in Proceedings: IEEE International Conference on Field-Programmable Technology – ICFPT 2007, IEEE, pp. 169–176, ISBN7, 2008. Dynamic Intellectual Property Protection for Reconfigurable Device

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2008-06-04 18:22:14
82

TABİMnet PERSONEL VE BORDRO PROGRAMI Personel ücretlerini aylık, günlük ve saatlik olarak girebilir, netten brüte veya brütten nete hesaplama yaptırabilirsiniz. Personelin yıllık izin kullanım bilgilerini taki

Add to Reading List

Source URL: tabim.net

Language: Turkish - Date: 2014-04-19 09:26:50
    83Coding theory / Analysis of algorithms / Computational complexity theory / Closest string / Hamming distance / Time complexity / Algorithmica / Theoretical computer science / Applied mathematics / NP-complete problems

    Local Search for String Problems: Brute Force is Essentially Optimal Jiong Guo, Danny Hermelin, Christian Komusiewicz Universit¨ at des Saarlandes, Ben-Gurion University, TU Berlin & Universit´

    Add to Reading List

    Source URL: www.cs.ucr.edu

    Language: English - Date: 2013-07-26 10:03:32
    84Logic programming / Predicate logic / Propositional calculus / Clause / J / Norm / Reason / Operational semantics / Brute fact / Software engineering / Computing / Computer programming

    Journal of Universal Computer Science, vol. 15, no), submitted: , accepted: , appeared: 1/7/09 © J.UCS On the Semantics and Verification of Normative Multi-Agent Systems L˘

    Add to Reading List

    Source URL: www.jucs.org

    Language: English - Date: 2010-11-24 10:39:58
    85Password / Key management / John the Ripper / Crypt / Key derivation function / Brute-force attack / OTPW / Shadow password / Cryptography / Security / Computer security

    Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Securit

    Add to Reading List

    Source URL: www.enck.org

    Language: English
    86Computer network security / Software testing / Metasploit Project / Rapid7 / Exploit / Penetration test / Attack / Brute-force attack / Evasion / Software / Computer security / Cyberwarfare

    Test your defenses more efficiently Rapid7 Metasploit Express helps penetration testers conduct assessments with Metasploit Express your opponents’ moves helps you more efficiently by accelerating common Knowing better

    Add to Reading List

    Source URL: www.rapid7.com

    Language: English - Date: 2014-08-27 14:54:18
    87Data mining / Machine learning / Search algorithms / Cluster analysis / Image processing / Hierarchical clustering / Nearest neighbor search / UPGMA / Single-linkage clustering / Statistics / Mathematics / Information science

    Fast Hierarchical Clustering and Other Applications of Dynamic Closest Pairs David Eppstein∗ Abstract dynamic closest pair problem. It can be solved by brute force 2 We develop data structures for dynamic closest pair

    Add to Reading List

    Source URL: www.ics.uci.edu

    Language: English - Date: 1997-11-20 19:58:04
    88Fire protection / Safety / Firefighting in the United States / Ansul / Marinette County /  Wisconsin / Fire suppression system / Safety equipment / Fire extinguisher / Tank / Fire suppression / Active fire protection / Building automation

    TOUGH CUSTOMERS Mobile Equipment Fire Suppression Systems PROTECTING HEAVY EQUIPMENT CALLS FOR BRUTE FORCE Before the introduction of ANSUL® vehicle fire

    Add to Reading List

    Source URL: torvacsolutions.com.au

    Language: English - Date: 2014-01-31 22:04:44
    89

    Production Intérieure Brute et ses emplois En millions de DA 2000 Consommation Finale Individuelle des Ménages Consommation Finale des Administrations Publiques

    Add to Reading List

    Source URL: www.ons.dz

    Language: French - Date: 2014-09-02 09:19:44
      90Berkeley Open Infrastructure for Network Computing / Denis Diderot / Eight queens puzzle / Weird number / Brute-force search / Mathematics / Software / Yoyo@home

      Paralellizing large search in BOINC: a case study Wenjie Fang, Universit´e Paris Diderot in co-operation with yoyo@home BOINC Workshop 2013, Grenoble, France

      Add to Reading List

      Source URL: boinc.berkeley.edu

      Language: English - Date: 2013-09-25 09:46:57
      UPDATE