BibSonomy bookmarks for /user/panic/Algorithmshttps://www.bibsonomy.org/user/panic/AlgorithmsBibSonomy RSS Feed for /user/panic/AlgorithmsThe Lenna StoryThe Lenna (or Lena) picture is one of the most widely used standard test images used for compression algorithms.'lena' or 'lenna' is a digitized Playboy centerfold, from November 1972. (Lenna is the spelling in Playboy, Lena is the Swedish spelling of the name.) Lena Soderberg (ne Sjööblom) http://www.cs.cmu.edu/~chuck/lennapg/panic2012-08-13T07:15:20+02:00=O Algorithms Article(s) Compression History Information <span itemprop="description">The Lenna (or Lena) picture is one of the most widely used standard test images used for compression algorithms.'lena' or 'lenna' is a digitized Playboy centerfold, from November 1972. (Lenna is the spelling in Playboy, Lena is the Swedish spelling of the name.) Lena Soderberg (ne Sjööblom) </span>Dictionary of Algorithms and Datastructuresa dictionary of algorithms, algorithmic techniques, data structures, archetypical problems, and related definitions.http://www.nist.gov/dads/panic2011-10-01T02:27:48+02:00Algorithms DataStructures Database Dictionary Programming Search WEB Science_and_Technology =Reference <span itemprop="description">a dictionary of algorithms, algorithmic techniques, data structures, archetypical problems, and related definitions.</span>Algorithms & Data Structures Indexhttp://cgm.cs.mcgill.ca/~godfried/teaching/algorithms-web.htmlpanic2011-10-01T02:27:37+02:00Algorithms DataStructures Database <a itemprop="url" data-versiondate="2011-10-01T02:27:37+02:00" href="http://cgm.cs.mcgill.ca/~godfried/teaching/algorithms-web.html" rel="nofollow" class="description-link">http://cgm.cs.mcgill.ca/~godfried/teaching/algorithms-web.html</a>An Illustrated Guide to Cryptographic Hashesthe recent news of weaknesses in some common security algorithms (MD4, MD5, SHA-0), many are wondering exactly what these things are...http://www.unixwiz.net/techtips/iguide-crypto-hashes.htmlpanic2011-10-01T02:27:28+02:00Cryptography Guide(s) Programming Algorithms =O <span itemprop="description">the recent news of weaknesses in some common security algorithms (MD4, MD5, SHA-0), many are wondering exactly what these things are...</span>Coding Bloom Filtersby Mark Fischer (11 September 2000)http://www.flipcode.com/articles/article_bloomfilters.shtmlpanic2011-10-01T02:27:28+02:00P2P Game(s) Algorithms BloomFilters&DHT Programming =O <span itemprop="description">by Mark Fischer (11 September 2000)</span>LOAFsimple extension to email that lets you append your entire address book to outgoing mail message without compromising your privacy. Correspondents can use this information to prioritize their mail, and learn more about their social networks.http://loaf.cantbedone.org/intro.htm#implementationpanic2011-10-01T02:27:28+02:00BloomFilters&DHT Algorithms Programming Information =Idea <span itemprop="description">simple extension to email that lets you append your entire address book to outgoing mail message without compromising your privacy. Correspondents can use this information to prioritize their mail, and learn more about their social networks.</span>Using Bloom FiltersBy Maciej Ceglowski April 08, 2004http://www.perl.com/lpt/a/2004/04/08/bloom_filters.htmlpanic2011-10-01T02:27:28+02:00Perl BloomFilters&DHT Algorithms Programming Information =O <span itemprop="description">By Maciej Ceglowski April 08, 2004</span>A Scalable Wide-Area Web Cache Sharing ProtocolLi Fan, Pei Cao and Jussara Almeida & Andrei Z. Broder - this new protocol, each proxy keeps a summary of the cache directory of each participating proxy, and checks these summaries for potential hits before sending any queries.http://www.cs.wisc.edu/~cao/papers/summary-cache/share.htmlpanic2011-10-01T02:27:27+02:00Network P2P BloomFilters&DHT Algorithms Programming Paper(s) Information =O <span itemprop="description">Li Fan, Pei Cao and Jussara Almeida & Andrei Z. Broder - this new protocol, each proxy keeps a summary of the cache directory of each participating proxy, and checks these summaries for potential hits before sending any queries.</span>C + + N u g g e t M i n eA collection of succinct C++ code examples.http://rossm.net/Electronics/Computers/Software/C++/index.htmpanic2011-10-01T02:27:27+02:00MFC Algorithms Windows Source Programming Information Cpp =O <span itemprop="description">A collection of succinct C++ code examples.</span>7-Zipcompression with highest compression ratio software and SDK for C++ (supports: 7z, ZIP, CAB, RAR, ARJ, GZIP, BZIP2, TAR, CPIO, RPM and DEB)http://www.7-zip.org/panic2011-10-01T02:27:26+02:00=Idea Algorithms Compression Cpp GNU_GPL GNU_LGPL OpenSource Programming SDK Software Tool(s) <span itemprop="description">compression with highest compression ratio software and SDK for C++ (supports: 7z, ZIP, CAB, RAR, ARJ, GZIP, BZIP2, TAR, CPIO, RPM and DEB)</span>Theo - Turing Machine And Finite Automaton Simulatora simulator for various concepts of theoretical computer science written in Java.http://kt3.theoinf.tu-ilmenau.de/~theoinf/panic2011-10-01T02:27:25+02:00Java Programming Algorithms OpenSource <span itemprop="description">a simulator for various concepts of theoretical computer science written in Java.</span>Denial of Service via Algorithmic Complexity AttacksScott A. Crosby & Dan S. Wallach Department of Computer Science, Rice Universityhttp://www.cs.rice.edu/~scrosby/hash/CrosbyWallach_UsenixSec2003/index.htmlpanic2011-10-01T02:27:25+02:00Network Algorithms Paper(s) Information =O <span itemprop="description">Scott A. Crosby & Dan S. Wallach Department of Computer Science, Rice University</span>Doxpara Researcha repository for information security analysis, UI theory, and the miscellaneous writingshttp://www.doxpara.com/panic2011-10-01T02:27:22+02:00Network Security Algorithms Programming NAT Firewall Information =Idea <span itemprop="description">a repository for information security analysis, UI theory, and the miscellaneous writings</span>Advanced Graphics AlgorithmsGraphics representation of reality - or at least virtual reality - in games, simulations, movies,http://www.devmaster.net/articles/graphics_alg/panic2011-10-01T02:27:22+02:00Game(s) Programming Algorithms Information Article(s) =ToRead <span itemprop="description">Graphics representation of reality - or at least virtual reality - in games, simulations, movies,</span>zsync @ freshmeat.neta client-side implementation of the rsync algorithm. It allows updating of files from a remote Web server without requiring a full download or a special remote server application.http://freshmeat.net/projects/zsync/panic2011-10-01T02:27:21+02:00Network C Programming Algorithms OpenSource =ToExamine <span itemprop="description">a client-side implementation of the rsync algorithm. It allows updating of files from a remote Web server without requiring a full download or a special remote server application.</span>Sequential Minimal Optimization (or SMO)a fast method to train Support Vector Machines (SVMs).http://www.research.microsoft.com/~jplatt/smo.htmlpanic2011-10-01T02:27:19+02:00Algorithms Programming Paper(s) Information Cpp <span itemprop="description">a fast method to train Support Vector Machines (SVMs).</span>A PAINLESS GUIDE TO CRC ERROR DETECTION ALGORITHMS"Everything you wanted to know about CRC algorithms, but were afraid to ask for fear that errors in your understanding might be detected."http://www.repairfaq.org/filipg/LINK/F_crc_v3.htmlpanic2011-10-01T02:27:18+02:00Network Programming Algorithms Information =O <span itemprop="description">"Everything you wanted to know about CRC algorithms, but were afraid to ask for fear that errors in your understanding might be detected."</span>Crypto++® Librarya free C++ class library of cryptographic schemes. a repository of public domain (not copyrighted) source code.http://www.eskimo.com/~weidai/cryptlib.htmlpanic2011-10-01T02:27:18+02:00Library Programming Algorithms =Idea Cpp <span itemprop="description">a free C++ class library of cryptographic schemes. a repository of public domain (not copyrighted) source code.</span>The Blowfish Encryption Algorithma symmetric block cipher that can be used as a drop-in replacement for DES or IDEA.http://www.schneier.com/blowfish.htmlpanic2011-10-01T02:27:18+02:00Programming Algorithms =O <span itemprop="description">a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA.</span>Graph Template Library (GTL)an extension of the Standard Template Library STL to graphs and fundamental graph algorithms.http://infosun.fmi.uni-passau.de/GTL/index.htmlpanic2011-10-01T02:27:18+02:00Programming Library Algorithms =Idea Cpp <span itemprop="description">an extension of the Standard Template Library STL to graphs and fundamental graph algorithms.</span>