Ranger's Way
  • Way => blog
  •  | 
  • Ranger => about me

    categoryCategory:

  • All *53
  • = [
  • Technology *33 ,
  • Misc *9 ,
  • Physics *11
  • ]
  • Object Oriented Design -- Chess Game July 02, 2014
    categoryTechnology tags object-oriented 1 , java 5

    Object Oriented Design for Chess Game.

    This is a simple version by myself, as I have not found a simple one on the Internet.

    More...
  • 公钥加密算法(三) Rabin May 27, 2014
    categoryTechnology tags cryptography 5 , asymmetric encryption 4 , Rabin 1 , 中国剩余定理 2

    The Rabin Cryptosystem is based on the idea that computing square roots modulo a composite N is simple when the factorization is known, but the very complex when it is unknown.

    Rabin加密系统是基于在已知合数N的因式分解的情况下,可以计算出二次剩余的平方根;但是在因式分解N未知的情况下很难求解的原理。

    More...
  • 公钥加密算法(二) RSA May 14, 2014
    categoryTechnology tags cryptography 5 , asymmetric encryption 4 , RSA 3 , 中国剩余定理 2

    我对RSA甚至加密以及计算机科学产生兴趣不得不说有很大一部分影响自阮一封的文章。

    这要从当年一款神级产品Google Reader说起,相信这款产品在很多人(尤其是IT人员吧)心中都是无可替代的经典。我也忘了当时为什么订阅了阮一封的RSS,可能是随手订阅,可能是一看到就被他的文风和排版所吸引。在Google Reader上面读文章是一种享受,在Google Reader上面读阮一封的文章更是。

    More...
  • 公钥加密算法(一) ElGamal May 07, 2014
    categoryTechnology tags cryptography 5 , asymmetric encryption 4 , ElGamal 1 , Hiffie-Hellman 1

    公钥加密算法的作用大家都很熟悉了,比如大名鼎鼎的RSA,被誉为计算机领域最重要的算法之一。

    学了Foundation of Cryptography之后,我了解了常用的公钥算法除了RSA之外还有好几种,甚至RSA被认为是不能严格证明的,不知道这个不能严格证明的问题和Snowden爆出来的RSA Backdoor有没有关系。

    More...
  • Spam Filter (4) -- Self-Learning & Augment April 14, 2014
    categoryTechnology tags ML 4 , spam 4 , Self-Learning 1

    Till then, I have achieved Average AUC of 0.921837 with Naive Bayes, and 0.909551 with Logistic Regression. This kind of result would rank at 3rd position in Discovery Challenge 2006.

    More...
  • 加州找工作可行性分析 April 02, 2014
    categoryMisc tags CA 1 , job 2

    简单介绍下我的背景,本科上海211,985,通信工程;目前在读CS master,学校一般,东岸的Stevens Institute。我水平比较弱(Cracking Coding 第一遍是用来熟悉语法,第一遍进行到11章;去湾区的时候第二遍进行中,但是难题依然都不会。)如果还想了解,可以看本站的about页面。

    More...
  • Spam Filter (3) -- Logistic Regression & TF-IDF March 03, 2014
    categoryTechnology tags ML 4 , spam 4 , LR 1 , TF-IDF 1

    I studied this method from one of papersposted on Third Conference on Email and Anti-Spam (CEAS 2006). [2] I implemented the basic Logistic Regression (LR) method followed by the conduct of it and it worked as good as the basic implementation of Graham’s Method.

    More...
« Prev 1 2 3 4 5 6 7 8 Next »
三人同行七十希
五樹梅花廿一支
七子團圓正半月
除百零五使得知

About me

My name is Renjie Weng.
I like physics, programming, and cycling.
Programmer => [ Java, C++, python, Android, etc. ]
Interests => [ Distributed Systems , Cryptography ]

tagsTags

  • jekyll 4
  • algorithm 11
  • Android 5
  • ML 4
  • spam 4
  • trip 4
  • cryptography 5
  • asymmetric encryption 4
  • RSA 3
  • java 5
  • Motorcycle 4
  • Cycling 3
  • Bicycle 3
  • ...

Favorite Bloggers

  • 阮一峰 wise & humility
  • Steve Losh artist & programmer
  • 卢昌海 wise & scientist
  • Jordan Scales geek, SOSS organizor
  • basiccoder 机智幽默的青岛小青年
  • zerowidth high quality, clean design
  • BeiYuu 写东西很负责
  • Yi Zeng bright & versatile
  • 酷壳 intelligent & diligent
  • netmeister Prof. Hack. Jan Schauma
  • Dan Lew a mobile developer
  • Wolfram Rittmeyer another Android developer
  • Software Passion a mobile developer
  • 海豚微笑的背后 电子书发布者,数码控
  • Cecil Woebker A high-school genius.
  • Bruce Schneier Debian OpenSSL mantainer
  • Beyond the Void 天才,科普很多东西
  • Matrix67 算法高手
© 2024 Renjie Weng. All rights reserved.