Showing 1 - 10 of 14
Persistent link: https://www.econbiz.de/10011799704
Persistent link: https://www.econbiz.de/10000767724
Persistent link: https://www.econbiz.de/10000773763
Persistent link: https://www.econbiz.de/10000781933
Persistent link: https://www.econbiz.de/10000817933
Persistent link: https://www.econbiz.de/10001056523
The computational encryption is used intensively by different databases management systems for ensuring privacy and …
Persistent link: https://www.econbiz.de/10009416412
Information encryption represents the usage of an algorithm to convert an unknown message into an encrypted one. It is … asymmetric key encryption algorithm formally adopted by the U.S. government and was elected after a long process of … through the network. In this paper we describe a concrete implementation of the AES algorithm in the Java programming language …
Persistent link: https://www.econbiz.de/10008837570
Heuristics for optimizing the distribution of trading executions in investors’ accounts. There is no polynomial algorithm …-scale integer linear programs seem as yet practically unsolvable or extremely time-consuming. The algorithm described herein … proposes an alternative approach to the problem. The algorithm consists of three steps: allocate the total executed quantity …
Persistent link: https://www.econbiz.de/10005087802
There are defined two optimum criteria for software analysis. For each criterion there are defined solutions in order to reach a minimum level. There are analyzed the effects of pursuing one objective over the other one. There is developed an aggregate function for which it is determined the two...
Persistent link: https://www.econbiz.de/10009416300