Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,252,364 papers from all fields of science
Search
Sign In
Create Free Account
Brute Force
Known as:
Brute Force (hacker text)
Brute Force (2005, Copernicus Books) is a book by Matt Curtin about cryptography. In this book, the author accounts his involvement in the DESCHALL…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Cryptography
DESCHALL Project
Encryption
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Methodology for Multiobjective Optimization of the AC Railway Power Supply System
M. Soler
,
Jesus Lopez
,
J. Mera
,
J. Maroto
IEEE transactions on intelligent transportation…
2015
Corpus ID: 8083235
Electrical dimensioning design in a railway infrastructure has high complexity and is strongly nonlinear. There are several…
Expand
2014
2014
Non-intrusive, out-of-band and out-of-the-box systems monitoring in the cloud
Sahil Suneja
,
C. Isci
,
Vasanth Bala
,
E. D. Lara
,
Todd W. Mummert
Measurement and Modeling of Computer Systems
2014
Corpus ID: 279469
The dramatic proliferation of virtual machines (VMs) in datacenters and the highly-dynamic and transient nature of VM…
Expand
Highly Cited
2009
Highly Cited
2009
Brute force and indexed approaches to pairwise document similarity comparisons with MapReduce
Jimmy J. Lin
Annual International ACM SIGIR Conference on…
2009
Corpus ID: 14482618
This paper explores the problem of computing pairwise similarity on document collections, focusing on the application of "more…
Expand
Highly Cited
2007
Highly Cited
2007
Improved Matchmaking Algorithm for Semantic Web Services Based on Bipartite Graph Matching
U. Bellur
,
Roshan Kulkarni
IEEE International Conference on Web Services…
2007
Corpus ID: 2018992
The ability to dynamically discover and invoke a Web service is a critical aspect of service oriented architectures. An important…
Expand
2005
2005
Brute Force: Cracking the Data Encryption Standard
Matt Curtin
2005
Corpus ID: 63426557
In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and intriguing book, Matt Curtin…
Expand
1999
1999
PROSODIC FEATURE EVALUATION: BRUTE FORCE OR WELL DESIGNED?
A. Batliner
,
J. Buckow
,
R. Huber
,
V. Warnke
,
Elmar Nöth
,
H. Niemann
1999
Corpus ID: 17891090
In this paper we want to bridge the gap between phonetic/phonological theory on the one hand and automatic speech processing on…
Expand
Highly Cited
1994
Highly Cited
1994
Optimum aerodynamic design via boundary control
A. Jameson
1994
Corpus ID: 118080656
These lectures describe the implementation of optimization techniques based on control theory for airfoil and wing design. In…
Expand
Highly Cited
1993
Highly Cited
1993
The use of Huygens' equivalence principle for solving 3-D volume integral equation of scattering
Caicheng Lu
,
W. Chew
1993
Corpus ID: 17925039
A three-dimensional (3-D) version of the nested equivalent principle algorithm (NEPAL) is presented. In 3-D, a scatterer is first…
Expand
1989
1989
Some Macdonald-Mehta Integrals by Brute Force
F. Garvan
1989
Corpus ID: 55736116
Bombieri and Selberg showed how Mehta’s [6; p. 42] integral could be evaluated using Selberg’s [7] integral. Macdonald [5; §§5,6…
Expand
1981
1981
An Examination of Brute Force Intelligence
H. Berliner
International Joint Conference on Artificial…
1981
Corpus ID: 3157808
We here examine the current state of brute-force chess programs. We are interested in their strong points and how these are…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE