(no subject)

Date: 2008-01-03 03:06 am (UTC)
Hmm. Is the analogy of secure crypto algorithms to cheat-proof search algorithms spurious?

(I.e., is it possible to build search algorithms that can't be subverted by malicious actors even if the algorithm is known to those malicious actors?)

I'm not seeing a way to do it, but then again, I'm not seeing a strong proof of impossibility, either.
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org

Profile

maradydd: (Default)
maradydd

September 2010

S M T W T F S
   1234
567891011
12131415 161718
19202122232425
26 27282930  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags