"I could write a spelling corrector that achieves 80 or 90% accuracy at a rate of at least 10 words per second." and did, a guide on how it works is included also.
Interview with Sebastian DeGuy. We discuss how small the textures can actual get, whether procedural textures can compare with textures in games like Crysis and much more
a tool to optimize the placement of rectangles in a band of semi-infinite size (2D bin packing problem). It can be useful for cutting stocks in trucks and factories.
a free (under GNU Lesser GPL) library which provides a uniform interface to a large number of hash algorithms. These algorithms can be used to compute checksums, message digests, and other signatures.
The Portable Network Graphics (PNG) is a format for storing compressed raster graphics. The compression engine is based on the Deflate method [RFC1951], designed by PKWare and originally used in PKZIP.
a new similarity ranking algorithm, together with its associated string similarity metric. I also include Java source code, so you can easily incorporate the algorithm into your own applications.
a fast password cracker, currently available for many flavors. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, many others supported out of the box
comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of
The numbers that control your life. You're identified by dozens of numbers. Your phone number, your driver's license number, your social security number, your zip code, your license plate, your credit card numbers. I find these numbers fascinating. Who distributes them? What can they be used for? How can you use them? How are they issued?
E. Alotaibi. Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, Seite 158–160. Richland, SC, International Foundation for Autonomous Agents and Multiagent Systems, (2019)
C. Draude, G. Klumbyte, und P. Treusch. Proceedings of International Workshop on Bias in Information, Algorithms, and Systems co-located with 13th International Conference on Transforming Digital Worlds (iConference 2018), CEUR Workshop Proceedings, (2018)
R. Binns, M. Van Kleek, M. Veale, U. Lyngs, J. Zhao, und N. Shadbolt. (2018)cite arxiv:1801.10408Comment: 14 pages, 3 figures, ACM Conference on Human Factors in Computing Systems (CHI'18), April 21--26, Montreal, Canada.
S. Bera, und A. Chakrabarti. 34th Symposium on Theoretical Aspects of Computer Science, STACS 2017, March 8-11, 2017, Hannover, Germany, Seite 11:1--11:14. (2017)
D. Adjiashvili, A. Baggio, und R. Zenklusen. Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, Seite 2364--2383. Philadelphia, PA, USA, Society for Industrial and Applied Mathematics, (2017)