Random search

Results: 189



#Item
181Diagrams / Discrete geometry / Triangulation / Voronoi diagram / Delaunay triangulation / Sweep line algorithm / Doubly connected edge list / Convex hull / Medial axis / Geometry / Computational geometry / Mathematics

contains q changes as a result of the ith insertion. Let Pi denote this probability (where the probability is taken over random insertion orders, irrespective of the choice of q). Since q could fall through up to three levels in the search tree as a result of each the insertion, the expected length of q’s search path in the final structure is at most

Add to Reading List

Source URL: www.skynet.ie

Language: English - Date: 2004-09-14 03:56:52
182Applied mathematics / Hashing / Cryptographic hash functions / Analysis of algorithms / Universal hashing / Hash table / Hash function / Parallel Random Access Machine / NC / Theoretical computer science / Search algorithms / Computational complexity theory

PDF Document

Add to Reading List

Source URL: www.unclaw.com

Language: English - Date: 2009-04-03 14:08:37
183Search algorithms / Preimage attack / Collision attack / MD5 / Random oracle / Collision resistance / SHA-1 / Hash chain / Collision / Cryptography / Cryptographic hash functions / Hashing

PDF Document

Add to Reading List

Source URL: www.cs.ut.ee

Language: English - Date: 2006-03-20 09:54:54
184Image processing / Content-based image retrieval / Automatic image annotation / Segmentation / Image retrieval / Random field / Spatial analysis / Computer vision / Artificial intelligence applications / Image search

PDF Document

Add to Reading List

Source URL: ccc.inaoep.mx

- Date: 2007-10-03 09:24:13
185Information / Search algorithms / Bloom filter / Hashing / Network congestion / Robust random early detection / Hash function / Routing / Algorithm / Network performance / Computing / Data

PDF Document

Add to Reading List

Source URL: hal.inria.fr

Language: English - Date: 2013-06-12 04:52:58
186Random oracle / Applied mathematics / Oracle machine / Merkle–Damgård construction / Advantage / Hash function / Mathematics / Cyberwarfare / Cryptographic hash functions / Hashing / Search algorithms

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-02-20 15:25:35
187Stochastic processes / Probability space / Random walk / Brute-force search / Independence / Sampling / Statistics / Probability theory / Search algorithms

PDF Document

Add to Reading List

Source URL: www.iscid.org

Language: English - Date: 2005-03-05 15:52:54
188Stochastic processes / Probability space / Random walk / Brute-force search / Independence / Sampling / Statistics / Probability theory / Search algorithms

PDF Document

Add to Reading List

Source URL: www.designinference.com

Language: English - Date: 2012-05-23 07:37:37
189Statistics / Ensemble learning / Model selection / Statistical classification / K-nearest neighbor algorithm / Random subspace method / Feature selection / Learning classifier system / Stochastic optimization / Machine learning / Artificial intelligence / Search algorithms

PDF Document

Add to Reading List

Source URL: nguyendangbinh.org

Language: English - Date: 2004-07-08 02:38:52
UPDATE