Considered harmful

Results: 96



#Item
61Search algorithms / Hashing / Preimage attack / Merkle–Damgård construction / Hash function / Alexander Sotirov / Cryptographic hash functions / Cryptography / MD5

MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-09-26 13:48:46
62

Copyright Notice The following manuscript EWD 215: A Case against the GO TO Statement was published as a letter entitled Go-to statement considered harmful in Commun. ACM), 3: 147–148. It is reproduced here by

Add to Reading List

Source URL: www.cs.utexas.edu

- Date: 2008-04-03 21:36:57
    63Procedural programming languages / Control flow / Goto / Structured programming / Edsger W. Dijkstra / Considered harmful / ALGOL 68 / C / Infinite loop / Software engineering / Computing / Computer programming

    LETTERS Robert L. Aslzedmrst, cditov Taulbee Survey Report I was disappointed in the report by David Gries on the

    Add to Reading List

    Source URL: web.archive.org

    Language: English
    64Computational neuroscience / Philosophy of mind / Cognition / Neuroscience / Neuropsychology / Thought experiment / Paul Thagard / Consciousness / Neural network / Mind / Cognitive science / Science

    THOUGHT EXPERIMENTS CONSIDERED HARMFUL Paul Thagard University of Waterloo Draft 4, May, 2013 Thagard, P. (forthcoming). Thought experiments considered harmful. Perspectives on Science.

    Add to Reading List

    Source URL: cogsci.uwaterloo.ca

    Language: English - Date: 2013-09-16 10:04:04
    65Hashing / Computing / Search algorithms / MD5 / HMAC / Crypt / Collision attack / SHA-1 / Md5sum / Error detection and correction / Cryptography / Cryptographic hash functions

    1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2004-12-06 19:52:41
    66

    Use Cases considered harmful Die Darstellung von Anwendungsfällen (Use Cases) ist ein Bestandteil der UML, die als Quasi-Standard für objektorientierte Beschreibungssprachen weit verbreitet ist. Anwendungsfall-Diagramm

    Add to Reading List

    Source URL: tamatzner.de

    Language: German - Date: 2003-10-29 15:27:36
      67Recursion / Type theory / Data types / Lambda calculus / Computability theory / Church encoding / Recursive data type / Mogensen–Scott encoding / Algebraic data type / Software engineering / Computing / Computer programming

      draft Church Encoding of Data Types Considered Harmful for Implementations – Functional Pearl – Pieter Koopman

      Add to Reading List

      Source URL: ifl2014.github.io

      Language: English - Date: 2015-03-04 15:20:42
      68

      etodica R•DGIVNING OG UDDANNELSE I SYSTEMUDVIKLING 30. oktober 2002 Månedsbrev 3 ”Use-cases considered harmful?”

      Add to Reading List

      Source URL: www.metodica.dk

      Language: Danish - Date: 2003-03-12 06:43:22
        69Technology / Wireless sensor network / IEEE 802 / Computer networking / IPv6 / ZigBee / Transmission Control Protocol / ALOHAnet / Received signal strength indication / Computing / Wireless networking / Internet

        Wireless ACK Collisions Not Considered Harmful Prabal Dutta† R˘azvan Mus˘aloiu-E.‡ †

        Add to Reading List

        Source URL: conferences.sigcomm.org

        Language: English - Date: 2008-09-16 10:59:42
        70Internet protocols / TCP/IP / Internet standards / Multicast Listener Discovery / Robert Bosch GmbH / Multicast address / Solicited-node multicast address / IPv6 / Heidelberg / Network architecture / Internet / Computing

        MLD Considered Harmful Breaking Another IPv6 Subprotocol Antonios Atlasis, [removed] Enno Rey, [removed] Jayson Salazar, [removed]

        Add to Reading List

        Source URL: www.ernw.de

        Language: English - Date: 2014-11-20 09:56:30
        UPDATE