Search results

Jump to navigation Jump to search
Results 1 – 21 of 938
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • .../ Ajay Kshemkalyani and Mukesh Singhal, Distributed Computing: Principles, Algorithms, and Systems, Cambridge University Press, 2008</ref> ==Algorithms== ...
    3 KB (389 words) - 14:14, 15 February 2022
  • {{short description|Classified U.S. cryptographic algorithms}} ...Suite A Cryptography''' is [[NSA cryptography]] which "contains classified algorithms that will not be released." "Suite A will be used for the protection of som ...
    3 KB (293 words) - 17:15, 6 June 2025
  • ...ies allowing for a full automation of the price-setting process in a stock exchange. This technology was implemented in several other stock exchanges in the 19 *Domowitz, I. and Wang, J. 1994 "Auctions as Algorithms: Computerized Trade Execution and Price Discovery", ''Journal of Economic D ...
    2 KB (284 words) - 01:03, 23 August 2023
  • ...ve been shared among the two sides over some secure channel. However, some algorithms share the keys at the time of authentication. ...other (e.g., Internet shopping), this is not practical. There are various algorithms for both symmetric keys and asymmetric public key cryptography to solve thi ...
    4 KB (650 words) - 20:34, 18 October 2024
  • ...d five core research areas, termed "virtual laboratories": [[symmetric key algorithms]] (STVL), [[public key algorithm]]s (AZTEC), [[protocol (cryptography)|prot === Yearly report on algorithms and key lengths === ...
    5 KB (702 words) - 08:26, 3 April 2025
  • ...the requests in the waiting queue must wait longer to be fulfilled, but in exchange FSCAN is more fair to all requests. [[Category:Disk scheduling algorithms]] ...
    2 KB (309 words) - 18:23, 4 October 2021
  • Medical algorithms are part of a broader field which is usually fit under the aims of [[medica ...e less complex in architecture, data structure and user interface. Medical algorithms are not necessarily implemented using digital computers. In fact, many of t ...
    5 KB (753 words) - 19:30, 31 January 2024
  • ...er turn? |url=https://chess.stackexchange.com/a/24325 |website=Chess Stack Exchange |accessdate=2019-06-01}}</ref> This means that, on average, a player has ab Higher branching factors make algorithms that follow every branch at every node, such as exhaustive [[brute-force se ...
    3 KB (453 words) - 12:53, 24 July 2024
  • {{short description|Public cryptographic algorithms}} '''NSA Suite B Cryptography''' was a set of cryptographic algorithms [[Promulgation|promulgated]] by the [[National Security Agency]] as part of ...
    9 KB (1,200 words) - 15:23, 23 December 2024
  • ...ared key; keeping data secret requires keeping this key secret. Public-key algorithms use a [[public key]] and a [[private key]]. The public key is made availabl Since public-key algorithms tend to be much slower than symmetric-key algorithms, modern systems such as [[Transport Layer Security|TLS]] and [[Secure Shell ...
    5 KB (776 words) - 04:27, 19 May 2025
  • ...following is a brief and incomplete summary of public knowledge about NSA algorithms and protocols. |Protection of secret algorithms in [[firmware]] ...
    9 KB (1,112 words) - 02:34, 21 October 2023
  • WTLS uses [[cryptography|cryptographic]] algorithms and in common with TLS allows negotiation of cryptographic suites between c === Algorithms === ...
    5 KB (738 words) - 05:05, 16 February 2025
  • ...n February 2003 twelve of the submissions were selected. In addition, five algorithms already publicly known, but not explicitly submitted to the project, were c ==Selected algorithms== ...
    5 KB (657 words) - 12:41, 17 October 2024
  • In natural populations, and in genetic algorithms, these decisions are automatic; whereas in typical HBGA systems, they are m * HBGA is a method of collaboration and knowledge exchange. It merges competence of its human users creating a kind of symbiotic human ...
    9 KB (1,191 words) - 21:31, 30 January 2022
  • ...gital Signature Algorithm]] (DSA), a hash function, [[SHA-1]], and a [[key exchange]] protocol.<ref name=Note2/> Capstone's first implementation was in the [[ ...
    2 KB (267 words) - 08:42, 2 November 2024
  • == Algorithms == ...kexchange.com/q/2187560 |access-date=2024-02-18 |website=Mathematics Stack Exchange |language=en}}</ref> <math>|V| = c + m</math>. Indeed, <math>C</math> conta ...
    4 KB (732 words) - 15:37, 15 June 2025
  • ...s a target belong to a class of algorithms known as ''volume participation algorithms''. Institutional buyers and algorithms often use VWAP to plan entries and initiate larger positions without distur ...
    5 KB (733 words) - 13:48, 21 February 2025
  • *[[Optical Multi-Tree with Shuffle Exchange]] ...
    2 KB (240 words) - 08:54, 9 July 2023
  • Four different compression algorithms are used by FXT1, chosen at a block level to optimize visual quality.<ref n ...tly taken over by [[Nvidia]]<ref name='sec'>[[United States Securities and Exchange Commission|SEC]] filings, [https://www.sec.gov/Archives/edgar/data/1010026/ ...
    7 KB (1,008 words) - 06:45, 13 April 2025
  • ...a common operation in many applications, and efficient [[Sorting algorithm|algorithms]] have been developed to perform it. ====Common algorithms==== ...
    6 KB (972 words) - 16:31, 19 May 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)