a free (under GNU Lesser GPL) library which provides a uniform interface to a large number of hash algorithms. These algorithms can be used to compute checksums, message digests, and other signatures.
a software framework that allows for advanced sequence and protocol stream analysis by utilizing bioinformatics algorithms. The sole purpose of this software is to identify protocol fields in unknown or poorly documented network protocol formats.
a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography
a client-side implementation of the rsync algorithm. It allows updating of files from a remote Web server without requiring a full download or a special remote server application.
The numbers that control your life. You're identified by dozens of numbers. Your phone number, your driver's license number, your social security number, your zip code, your license plate, your credit card numbers. I find these numbers fascinating. Who distributes them? What can they be used for? How can you use them? How are they issued?
Solving the nice puzzle below, I found it easier to define a stream coinductively than to define a function from natural numbers inductively. You’re standing in front of a 100 story building with two identical bowling balls. You’ve been tasked with testing the bowling balls’ resilience. The building has a stairwell with a window at each story from which you can (conveniently) drop bowling balls. To test the bowling balls you need to find the first floor at which they break. It might be the 100th floor or it might be the 50th floor, but if it breaks somewhere in the middle you know it will break at every floor above. Devise an algorithm which guarantees you’ll find the first floor at which one of your bowling balls will break. You’re graded on your algorithm’s worst-case running time. “Running time” here means the number of times we drop a ball.
Keeping two or more copies of the same document synchronized with each other in real-time is a complex challenge. This paper describes the differential synchronization algorithm. Differential synchronization offers scalability, fault-tolerance, and responsive collaborative editing across an unreliable network. 1 Conventional Strategies The three most common approaches to synchronization are ownership, event passing and three-way merges. These methods are conceptually simple, but all have drawbacks. link to googletalk video and mobWrite sw
Matthew's C++ Genetic Algorithms Library is set of C++ genetic algorithm objects, it includes tools for using genetic algorithms to do optimization in any C++ program.
Interview with Sebastian DeGuy. We discuss how small the textures can actual get, whether procedural textures can compare with textures in games like Crysis and much more
a rule engine and scripting environment written entirely in Sun's Java, you can build Java software that has the capacity to "reason" using knowledge you supply in the form of declarative rules. Jess is small, light, and one of the fastest rule engines av
"I could write a spelling corrector that achieves 80 or 90% accuracy at a rate of at least 10 words per second." and did, a guide on how it works is included also.
This paper presents a framework for modeling and optimizing max algorithms commonly used in crowdsourcing. The model allows tuning the number of human responses needed and the size of item sets to be compared for achieving a certain level of quality given time and budget constraints.
a fast password cracker, currently available for many flavors. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, many others supported out of the box
comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of
The Portable Network Graphics (PNG) is a format for storing compressed raster graphics. The compression engine is based on the Deflate method [RFC1951], designed by PKWare and originally used in PKZIP.
Growing interest in data and analytics in education, teaching, and learning raises the priority for increased, high-quality research into the models, methods, technologies, and impact of analytics. Two research communities – Educational Data Mining (EDM) and Learning Analytics and Knowledge (LAK) have developed separately to address this need. This paper argues for increased and formal communication and collaboration between these communities in order to share research, methods, and tools for data mining and analysis in the service of developing both LAK and EDM fields.
Not all learning analytics are the same. Discover how proactive learning analytics help you influence and improve ongoing learning processes by predicting the future and creating recommendations for action. Identify the 4 key elements that will determine the success of your analytics journey.
Tutorial, Learning Analytics Summer Institute, Ann Arbor, June 2017 As algorithms pervade societal life, they’re moving from an arcane topic reserved for computer scientists and mathematicians, to the object of far wider academic and mainstream media attention
Regulation is a key word when the Nordic countries discuss the platform economy. The challenge is to secure good working conditions for the individual, a level playing field for businesses and tax revenues for the state. New technology is good, but the platforms must be developed in line with the labour market as a whole.
IDEA is a series of nonverbal algorithm assembly instructions by Sándor P. Fekete, Sebastian Morr, and Sebastian Stiller. They were originally created for Sándor's algorithms and datastructures lecture at TU Braunschweig, but we hope they will be useful in all sorts of context. We publish them here so that they can be used by teachers, students, and curious people alike.
In 1687, Sir Isaac Newton published his seminal article “Philosophiae Naturalis Principia Mathematica” in which he described the motion of celestial bodies (Newton, 1987).
La ministra Yolanda Díaz abre de nuevo la mesa de negociación con sindicatos y patronal tras el acuerdo alcanzado para reconocer a los 'riders' como trabajadores de las plataformas de reparto
El texto reconoce la relación laboral existente entre el repartidor y las compañías, en línea con la sentencia del Tribunal Supremo, y obliga a las empresas a informar a los sindicatos sobre el funcionamiento de los algoritmos de la aplicación