Search results
Jump to navigation
Jump to search
- {{Short description|Regular expression denial-of-service attack}} A '''regular expression denial of service''' ('''ReDoS''')<ref name="ReDoS in OWASP"> ...16 KB (2,284 words) - 15:26, 22 February 2025
- ...r puzzle protocol''' can be seen as a form of [[Proof-of-work system|proof-of-work]] (POW) protocol. ...imes in a tour, so the term ''stop'' is used to denote a single appearance of a tour guide in a tour. A client knows which tour guide is at the next stop ...10 KB (1,646 words) - 22:41, 18 January 2024
- ...ers problem''' studies how to perform a [[secure multi-party computation]] of the boolean-XOR function. [[David Chaum]] first proposed this problem in th ...informs them that the meal has been paid for by someone, who could be one of the cryptographers or the [[National Security Agency]] (NSA). The cryptogr ...16 KB (2,357 words) - 18:15, 8 May 2024
- ...dictive inference|predictive performance]] than could be obtained from any of the constituent learning algorithms alone.<ref>{{cite journal |journal=[[Journal of Artificial Intelligence Research]] ...53 KB (7,534 words) - 06:25, 28 February 2025
- {{short description|Set of standards under development by the IEEE for real-time networking}} ...group. The standards define mechanisms for the time-sensitive transmission of data over deterministic [[Ethernet]] networks. ...60 KB (8,598 words) - 20:49, 10 February 2025