Explore >> Select a destination


You are here

victoria.dev
| | lemire.me
8.7 parsecs away

Travel
| | You can sort large files while using little memory. The Unix sort tool is a widely available implementation of this idea. Files are written to disk sequentially, without random access. Thus, you can also sort variable-length records, such as lines of text. What about shuffling? Using the Fisher-Yates algorithm also known as Knuth algorithm, you ... Continue reading External-memory shuffling in linear time?
| | skerritt.blog
5.1 parsecs away

Travel
| | Greedy algorithms aim to make the optimal choice at that given moment. Each step it chooses the optimal choice, without knowing the future. It attempts to find the globally optimal way to solve the entire problem using this method. Why Are Greedy Algorithms Called Greedy? We call algorithms greedy when
| | lukesingham.com
3.6 parsecs away

Travel
| | Grokking Algorithms is a beautifully formatted book that explains complex material simply using pictures, analogies and high level practical explanations. This post is a review and summary of the Grokking Algorithms book.
| | rog3rsm1th.github.io
33.2 parsecs away

Travel
| The Okamoto-Uchiyama cryptosystem is a semantically secure, asymmetric encryption algorithm. It was first introduced in 1998 by Tatsuaki Okamoto and Shigenori Uchiyama. The method is additive-homomorphic, which means that the plaintexts are added by multiplying two ciphertexts. It is therefore not necessary to decrypt the ciphertexts in order to be able to operate on the plaintexts. While searching for implementations of this algorithm on github, I realized that there were only two rough implementations.