Algorithm Documentation

Discover algorithm documentation, include the articles, news, trends, analysis and practical advice about algorithm documentation on alibabacloud.com

[Documentation] Parallel Data Mining algorithm toolbox and data Mining cloud based on Hadoop platform

Parallel Data Mining algorithm toolbox and data Mining cloud based on Hadoop platform [download Address]http://bbs.chinacloud.cn/showtopic-12728.aspx

Crypt_blowfish 1.2 Release password hash algorithm tool

Crypt_blowfish is a cryptographic hash algorithm based on Globefish packet cipher, which is provided through Crypt (3) and a reentrant interface. It is used in OpenBSD with Bcrypt compatibility. It allows for future processor performance improvements that allow you to arbitrarily increase the check password while still maintaining compatibility with your old password hash compatibility processing costs. The hash value it produces is strong in several orders of magnitude, stronger than the traditional UNIX based des-based or FreeBSD md5-based. Blo ...

K-tree 0.4.1 Publishing Clustering Algorithm tool

K-tree is a tree-like clustering algorithm. It is also called tree structure vector quantization (TSVQ). The goal of clustering analysis is in similar group objects. Each K-tree object represents a dimension vector space. All vectors in the tree must be the same number of dimensions. K-tree provides a scalable clustering method combining B+-tree and K cluster algorithms. Clusters can be used to solve signal processing problems, using machine learning, and other environments. It has also recently been used to solve problems in the Wikipedia documentation cluster. K-tree 0 ...

Technical Documentation: a hybrid encryption scheme based on certificates in the standard model of cloud computing

The standard model of cloud computing based on certificate hybrid encryption scheme ping Herdach with the rapid development of cloud computing, data security has become a key problem of cloud security, especially the large amount of data stored and transmitted in the cloud and the high security requirements. On the other hand, based on the certificate cryptosystem, it overcomes the problem of the traditional public key cryptosystem and the key escrow based on the identity cipher system, and provides a new method for constructing the security and efficient PKI, but the existing certificate-based encryption schemes mostly adopt bilinear pair structure, and the computational efficiency is low. For cloud computing environments, based on reduced judgment ...

Introduction to PGP

This article mainly introduces some principles and background knowledge about PGP implementation. Other documents on the installation and use of PGP refer to other documentation provided with this article. PGP pretty-Privacy is a mail encryption software based on RSA public key encryption system. You can use it to keep your emails secret to prevent unauthorized reading, and it can also digitally sign your emails so that the recipient can be sure you sent them. It allows you to safely communicate with people you've never seen before, and you don't need any confidential channels to pass the secret.

Book Recommendation: God-like product Manager

Edited by Shang ISBN 978-7-121-16885-7 June 2012 Published pricing: 79.00 Yuan 16 open 496 pages of propaganda: The book has a full picture, there are details, including more combat. For this system of complex business, this book made Ha Fi analysis definition, carding and summary. Brief introduction This is a systematic exposition of mobile and Internet products from scratch, from have to excellent product manager practice case works. And this book runs through the "people such as products, products such as people" and "products of the roots and sources from the real life" ...

Around Hadoop eco-software and brief working principles (i)

Basically are in group discussion, when others ask the introductory questions, later thought of new problems to add in.   But the problem of getting started is also very important, the understanding of the principle determines the degree of learning can be in-depth.   Hadoop is not discussed in this article, only peripheral software is introduced.   Hive: This is the most software I've ever asked, and it's also the highest utilization rate around Hadoop.   What the hell is hive? How to strictly define hive is really not too easy, usually for non-Hadoop professionals ...

Yan Lan: build a highly available MongoDB cluster (2)

http://www.aliyun.com/zixun/aggregation/13461.html"> MongoDB, formerly known as 10gen, was founded in 2007 and after receiving a total of $ 231 million in 2013, the company's market capitalization has risen to 10 Billion dollar level, which is the result of 20 years of Red Hat, a well-known open-source company founded in 1993. High performance and easy scalability have been the foundation of MongoDB and meanwhile standardized documents ...

Ingenious way to unlock others asp Trojan password

Cracked goal: To crack an encrypted ASP Trojan landing password. Because there is no version in the Trojan, specifically do not know what the name of this Trojan. Break the train of thought: Two kinds, use encrypt cipher to replace cipher text and use cipher text and encrypt algorithm to solve the password. The former is not really cracked. If you do not get the ASP source code, then can be said to crack the password, I have no chance of success. A Chinese friend said he got a web permission, but could not modify the home page, found that there is an ASP trojan, but the password is encrypted. Well, there's too much nonsense, so, make sure ...

Sterling Silver: A number of project experiences for start-up companies to compress process costs

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest Cloud host Technology Hall I mentioned that the Cicada team is more effective in compressing the process costs.        This part can be talked about, perhaps to others a little help. About the project so far, although we have only made a cicada travels, actually did another four app design, but not when ...

Total Pages: 3 1 2 3 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.