search for: algorithm

Displaying 20 results from an estimated 11418 matches for "algorithm".

2007 Nov 06
4
Checksum Algorithm
Hi, We have seen a huge performance drop in 1.6.3, due to the checksum being enabled by default. I looked at the algorithm being used, and it is actually a CRC32, which is a very strong algorithm for detecting all sorts of problems, such as single bit errors, swapped bytes, and missing bytes. I''ve been experimenting with using a simple XOR algorithm. I''ve been able to recover most of the lost perfor...
2017 Oct 17
4
uniform sampling without replacement algorithm
Let us consider the current uniform sampling without replacement algorithm. It resides in function do_sample in https://svn.r-project.org/R/trunk/src/main/random.c Its complexity is obviously O(n), where the sample is selected from 1...n, since the algorithm has to create a vector of length n. So when the sample size is much lesser than n, the algorithm is not effective...
2024 Jan 27
2
enable strong KexAlgorithms, Ciphers and MACs in /etc/ssh/sshd_config file on RHEL 8.x Linux OS
On Fri, Jan 26, 2024 at 7:24?PM Jochen Bern <Jochen.Bern at binect.de> wrote: > On 25.01.24 14:09, Kaushal Shriyan wrote: > > I am running the below servers on Red Hat Enterprise Linux release 8.7 > > How do I enable strong KexAlgorithms, Ciphers and MACs > > On RHEL 8, you need to be aware that there are "crypto policies" > modifying sshd's behaviour, and it would likely be the *preferred* > method to inject your intended config changes *there* (unless they > happen to already be part of an existing p...
2024 Jan 26
1
enable strong KexAlgorithms, Ciphers and MACs in /etc/ssh/sshd_config file on RHEL 8.x Linux OS
On 25.01.24 14:09, Kaushal Shriyan wrote: > I am running the below servers on Red Hat Enterprise Linux release 8.7 > How do I enable strong KexAlgorithms, Ciphers and MACs On RHEL 8, you need to be aware that there are "crypto policies" modifying sshd's behaviour, and it would likely be the *preferred* method to inject your intended config changes *there* (unless they happen to already be part of an existing policy, like FUTURE)....
2008 Jul 09
2
Port package
Hi When I type: > ?nls I come across this section: algorithm: character string specifying the algorithm to use. The default algorithm is a Gauss-Newton algorithm. Other possible values are '"plinear"' for the Golub-Pereyra algorithm for partially linear least-squares models and '"port"&...
2009 May 14
1
"Fast" correlation algorithm
Hi, Is in R any "fast" algorithm for correlation? What I mean is: I have very large dataset (microarray) with 55000 rows and 100 columns. I want to count correlation (p-value and cor.coef) between each row of dataset and some vector (of course length of this vector is equal to number of columns of dataset). In short words: For t-t...
2014 Mar 05
3
[LLVMdev] [cfe-dev] C++11 reverse iterators (was C++11 is here)
...th <dexonsmith at apple.com> wrote: > There’s a decent selection of range adaptors in Boost.Range [1]. I’m not sure the license [2] allows copying the source (IANAL), but any reason not use the same names? I don’t see any reason to reinvent the wheel here. > > Because I think that algorithms (and functions more generally) should be verbs. The names will be very similar all the same. I agree. Algorithms should be verbs. However, I disagree that range adaptors are algorithms. “reverse” sounds like an algorithm. Consider, from the STL: template <class Iterator> void rever...
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most relevant information is near the top, but it''s all quite good... :-) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- There is no intrinsic difference between algorithm and data, the same information can be viewed as data in one context and as algorithm in another. Why then do so many people claim that encryption algorithms should be made public and only the key should be kept secret? (This is the famous and derisive mantra about "security through obscurity&q...
2017 Jun 29
2
Packages for Learning Algorithm Independent Branch and Bound for Feature Selection
I am looking for packages that can run a branch-and-bound algorithm to maximize a distance measure (such as Bhattacharyya or Mahalanobis) on a set of features. I would like this to be learning algorithm independent, so that the method just looks at the features, and selects the subset of a user-defined size that maximizes a distance criteria such as those stated a...
2011 Sep 26
0
[LLVMdev] Greedy Register Allocation in LLVM 3.0
Hi Jakob, Thanks for a very interesting description of the new register allocation algorithm in LLVM!!! Could you elaborate a bit on the following topics: 1) Do you have any plans to publish something more formal and detailed about this algorithm, e.g. a paper or something similar?  It would be nice to better understand how this algorithm relates to well-known algorithms described in the...
2007 Sep 21
4
Diffie Hellman key exchange algorithms
A few questions regarding the OpenSSH support for the Diffie Hellman key exchange algorithms: (1) Are the diffie-hellman-group-exchange-sha256", "diffie-hellman-group-exchange-sha1" , "diffie-hellman-group14-sha1" "diffie-hellman-group1-sha1" (as defined in RFCs 4253 and RFC 4419) the complete list of key exchange algorithms supported by OpenSSH? (2) I...
2016 Jul 24
2
[Question] Multichannel load-balancing algorithm
Hello, I have a question about multichannel and the load-balancing algorithm. What kind of algorithm is it? (Roud-robin, dynamic round-robin, ...) What are the arguments the algorithm compute to load-balance the network traffic on the interfaces? I already know that if a 10Gb/s interface and a 1Gb/s interfaces are in the multichannel connection the 1Gb/s one will be ignore...
2017 Jul 01
1
Packages for Learning Algorithm Independent Branch and Bound for Feature Selection
See, I have built my own genetic algorithm already and tested it on this problem. I have a solution, but due to the heuristic nature of GA, I cannot guarantee that it is the optimal subset. If I was simply doing this for a company project, you are spot on with the type of algorithm I would use, but I am doing this for a scientific paper. I...
2012 Jan 07
2
[LLVMdev] dominance frontiers
...exactly the reason chris specifies. In fact, until we started local SSA updating (which is now many years ago, but ...), dominance frontier calculation for ssa updating was in the top 10 profile functions for GCC compiles of large source files. I had tried a number of the linear time phi placement algorithms instead, but sadly, none were fast enough in practice (I believe someone later published a paper comparing them all and finding the same thing). As a completely random aside, the algorithm given in the original paper you cited is actually not quite the best way in practice. It performs more comp...
2007 Feb 21
1
Confindence interval for Levenberg-Marquardt fit
Dear all, I would like to use the Levenberg-Marquardt algorithm for non-linear least-squares regression using function nls.lm. Can anybody help me to find a a way to compute confidence intervals on the fitted parameters as it is possible for nls (using confint.nls, which does not work for nls.lm)? Thank you for your help Michael
2017 Jul 01
0
Packages for Learning Algorithm Independent Branch and Bound for Feature Selection
On Thu, 29 Jun 2017, Alex Byrley writes: > I am looking for packages that can run a branch-and-bound algorithm to > maximize a distance measure (such as Bhattacharyya or Mahalanobis) on a set > of features. > > I would like this to be learning algorithm independent, so that the method > just looks at the features, and selects the subset of a user-defined size > that maximizes a distance cr...
2011 Sep 19
6
[LLVMdev] Greedy Register Allocation in LLVM 3.0
I just uploaded a blog post outlining the new register allocation algorithm in LLVM 3.0. http://blog.llvm.org/2011/09/greedy-register-allocation-in-llvm-30.html Please direct comments here. /jakob
2012 Oct 03
1
Echo Cancelation Algorithm Details and Tuning
Hi, I am just starting up on SPEEX AEC algorithm and have couple of questions around echo cancelation algorithm used in SPEEX. 1) Usually Echo Cancelation Algorithm has support for number of components ? - Non-Linear Processor (NLP) - Automatic Microphone Gain Control (AGC) - Transducer Equalization (EQ) - Dyna...
2006 Apr 04
2
EM algorithm
Dear R-Users, I have a model with a latent variable for a spatio-temporal process. I would like to use EM algorithm to estimate the parameters. Does anybody know how to implement the algorithm in R? Thank you very much in advance, Michela
2015 Mar 10
2
[LLVMdev] GVN PRE algorithms in LLVM
The GVN algorithm used in LLVM currently (I'm rewriting it) is the basic hash based RPO algorithm. The new one i'm writing is based on http://dl.acm.org/citation.cfm?id=512536 (see https://github.com/dberlin/llvm-gvn-rewrite) LLVM has different algorithms for both scalar PRE and load PRE. They are basicall...