Several proofs of security for a tokenization algorithm.
Riccardo AragonaRiccardo LongoMassimiliano SalaPublished in: Appl. Algebra Eng. Commun. Comput. (2017)
Keyphrases
- preprocessing
- learning algorithm
- optimization algorithm
- computational cost
- cost function
- improved algorithm
- computational complexity
- search space
- significant improvement
- recognition algorithm
- k means
- dynamic programming
- worst case
- high accuracy
- simulated annealing
- matching algorithm
- genetic algorithm
- detection algorithm
- security issues
- computationally efficient
- linear programming
- experimental evaluation
- np hard
- search algorithm
- optimal solution