NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Jeffrey Ehme – PRIMUS, 2024
The Miller-Rabin test is a useful probabilistic method for finding large primes. In this paper, we explain the method in detail and give three variations on this test. These variations were originally developed as student projects to supplement a course in error correcting codes and cryptography.
Descriptors: Probability, Numbers, Coding, Algorithms
Peer reviewed Peer reviewed
Direct linkDirect link
Mark Johnson; Rafiq Saleh – Interactive Learning Environments, 2024
Educational assessment is inherently uncertain, where physiological, psychological and social factors play an important role in establishing judgements which are assumed to be "absolute". AI and other algorithmic approaches to grading of student work strip-out uncertainty, leading to a lack of inspectability in machine judgement and…
Descriptors: Artificial Intelligence, Evaluation Methods, Technology Uses in Education, Man Machine Systems
Peer reviewed Peer reviewed
Bassiouni, Mostafa A.; Mukherjee, Amar – Journal of the American Society for Information Science, 1995
Discusses the problem of enhancing the speed of Huffman decoding of compressed data. Topics addressed include the Huffman decoding tree; multibit decoding; binary string mapping problems; and algorithms for solving mapping problems. (22 references) (LRW)
Descriptors: Algorithms, Coding, Research Needs
Pizzi, Skip – 1995
Public radio is about to achieve a new technological level as the new Public Radio Satellite System (PRSS) is deployed. The network will dramatically improve the capacity and quality of its interconnection system, but proper interfacing at member stations will be required to realize the full benefits of the new system. The new system uses digital…
Descriptors: Algorithms, Audio Equipment, Broadcast Reception Equipment, Coding
Peer reviewed Peer reviewed
Diamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks