X-Nico

unusual facts about algorithm


Foreign exchange autotrading

Fully automated or robotic forex trading: This is very similar to algorithmic trading or black-box trading, where a computer algorithm decides on aspects of the order such as the timing, price or quantity and initiates the order automatically.


Abcodia

It was invented by Professor Ian Jacobs, Dean & Head School of Medicine, Faculty of Medical & Human Sciences, University of Manchester, and formerly of Queen Mary, University of London, and Dr Steven Skates, of the Biostatistics Center, MGH, who together studied longitudinal patterns of CA125 in multiple cohorts of post-menopausal women to develop a statistical algorithm efficiently combining information in age and serial CA125 levels.

Abraham Lempel

The LZ77 and LZ78 algorithms authored by Lempel and Jacob Ziv have led to a number of derivative works, including the Lempel–Ziv–Welch algorithm, used in the GIF image format, and the Lempel-Ziv-Markov chain algorithm, used in the 7-Zip and xz compressors.

Adaptive Huffman coding

There are a number of implementations of this method, the most notable are FGK (Faller-Gallager-Knuth) and Vitter algorithm.

Aimbot

But, if it's done right meaning if it uses a color distance-algorithm it may work even though the colors are distorted, the algorithm will check if the color is within a given range of tolerance, this may require a different color space than RGB, often used is LAB, or HSB.

András Frank

Using the LLL-algorithm, Frank, and his student, Éva Tardos developed a general method, which could transform some polynomial time algorithms into strongly polynomial.

BassOmatic

The name is explained in this comment from the source code: "BassOmatic gets its name from an old Dan Aykroyd Saturday Night Live skit involving a blender and a whole fish. The BassOmatic algorithm does to data what the original BassOmatic did to the fish."

Berlekamp–Zassenhaus algorithm

In mathematics, in particular in computational algebra, the Berlekamp–Zassenhaus algorithm is an algorithm for factoring polynomials over the integers, named after Elwyn Berlekamp and Hans Zassenhaus.

Connected component

Connected-component labeling, an algorithm for finding contiguous subsets of pixels in a digital image

Coppersmith–Winograd algorithm

In linear algebra, the Coppersmith–Winograd algorithm, named after Don Coppersmith and Shmuel Winograd, was the asymptotically fastest known algorithm for square matrix multiplication until 2010.

CryptGenRandom

A cryptanalysis of CryptGenRandom, published in November 2007 by Leo Dorrendorf and others from the Hebrew University of Jerusalem and University of Haifa, found significant weaknesses in the Windows 2000 implementation of the algorithm.

Dijkstra–Scholten algorithm

The Dijkstra–Scholten algorithm (named after Edsger W. Dijkstra and Carel S. Scholten) is an algorithm for detecting termination in a distributed system.

Dijkstra's algorithm

The process that underlies Dijkstra's algorithm is similar to the greedy process used in Prim's algorithm.

Discrete logarithm records

On 18 Jun 2005, Antoine Joux and Reynald Lercier announced the computation of a discrete logarithm modulo a 130-digit (431-bit) strong prime in three weeks, using a 1.15 GHz 16-processor HP AlphaServer GS1280 computer and a number field sieve algorithm.

Dissociated press

The article included the Turbo Pascal source for two versions of the generator, one using Hayes' algorithm and another using Claude Shannon's Hellbat algorithm.

Duma Optronics

Secondly, the use of Knife Edge type analyzers, a unique state-of-the-art technology (patented), enabling a knife edge profiling the beam at various intersection angles, followed by a Tomographic reconstruction algorithm, generating the spatial intensity distribution map at the intersection plane.

Dynamic Markov compression

Dynamic Markov compression (DMC) is a lossless data compression algorithm developed by Gordon Cormack and Nigel Horspool.

Edge coloring

Similar coloring techniques may also be used to schedule other sports pairings that are not all-play-all; for instance, in the National Football League, the pairs of teams that will play each other in a given year are determined, based on the teams' records from the previous year, and then an edge coloring algorithm is applied to the graph formed by the set of pairings in order to assign games to the weekends on which they are played.

Euclidean minimum spanning tree

The simplest algorithm to find an EMST in two dimensions, given n points, is to actually construct the complete graph on n vertices, which has n(n-1)/2 edges, compute each edge weight by finding the distance between each pair of points, and then run a standard minimum spanning tree algorithm (such as the version of Prim's algorithm or Kruskal's algorithm) on it.

Freeway Traffic Management System

Research on new algorithm developments and evaluations is performed at the ITS Centre and Testbed (ICAT), at the Civil Engineering department of the University of Toronto.

Glowworm swarm optimization

The GSO algorithm was developed and introduced by K.N. Krishnanand and D. Ghose in 2005 at the Guidance, Control, and Decision Systems Laboratory in the Department of Aerospace Engineering at the Indian Institute of Science, Bangalore, India.

Hilltop

Hilltop algorithm, an algorithm used to find topic-relevant documents to a particular keyword topic, acquired by Google

IBM 3624

The PIN functions, with an early commercial encryption using the DES algorithm, were implemented in two modules - BQKPERS and BQKCIPH - and their export controlled under the US export munitions rules.

Insertion sort

D.L. Shell made substantial improvements to the algorithm; the modified version is called Shell sort.

International Data Encryption Algorithm

In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991.

James H. Ellis

When, a few years later, Diffie and Hellman published their 1976 paper, and shortly after that Rivest, Shamir, and Adleman announced their algorithm, Cocks, Ellis, and Williamson suggested that GCHQ announce that they had previously developed both.

Jon Bentley

He and Thomas Ottmann invented the Bentley–Ottmann algorithm, an efficient algorithm for finding all intersecting pairs among a collection of line segments.

Karplus–Strong string synthesis

The first musical use of the algorithm was in the work May All Your Children Be Acrobats written in 1981 by David A. Jaffe, and scored for eight guitars, mezzo-soprano and computer-generated stereo tape, with a text based on Carl Sandburg's The People, Yes.

Leonidas J. Guibas

The research contributions he is known for include finger trees, red-black trees, fractional cascading, the Guibas–Stolfi algorithm for Delaunay triangulation, an optimal data structure for point location, the quad-edge data structure for representing planar subdivisions, Metropolis light transport, and kinetic data structures for keeping track of objects in motion.

Levenberg–Marquardt algorithm

The algorithm was first published by Kenneth Levenberg, while working at the Frankford Army Arsenal.

Midsphere

A Mathematica implementation of an algorithm for constructing canonical polyhedra.

Multidimensional scaling

It is also very advisable to give the algorithm (e.g., Kruskal, Mather), which is often defined by the program used (sometimes replacing the algorithm report), if you have given a start configuration or had a random choice, the number of runs, the assessment of dimensionality, the Monte Carlo method results, the number of iterations, the assessment of stability, and the proportional variance of each axis (r-square).

Music Mouse

Music Mouse is an algorithmic musical composition software developed by Laurie Spiegel.

Pecota

PECOTA (Player Empirical Comparison and Optimization Test Algorithm), a statistical method for baseball analysis

Percolation

The current fastest algorithm for percolation was published in 2000 by Mark Newman and Robert Ziff.

Phred base calling

LaDeana Hillier, Michael Wendl, David Ficenec, Tim Gleeson, Alan Blanchard, and Richard Mott also contributed to the codebase and algorithm.

POW-R

One of the first products to include POW-R was a hardware dithering unit from Weiss engineering; in a review of this product in 1999, mastering engineer Bob Katz spoke highly of the new algorithm declaring it ‘an incredible achievement’.

Powell

Powell's method, algorithm for finding the minimum of a non-differentiable function

Proportional hazards model

Using this score function and Hessian matrix, the partial likelihood can be maximized using the Newton-Raphson algorithm.

Renormalization

Although he reached inconsistent results, an improved formula studied by Hartle, J. Garcia, and based on the works by E. Elizalde includes the technique of the zeta regularization algorithm

Rock Phish

This report that calls them the Rock Phish gang comes from a research firm known as Gartner, supported by RSA.

Schoof

Schoof–Elkies–Atkin algorithm, extension of Schoof's algorithm by Noam Elkies and A. O. L. Atkin to improve its efficiency

Shor's algorithm

On the television show Stargate Universe, the lead scientist, Dr. Nicholas Rush, hoped to use Shor's algorithm to crack Destinys master code.

Sturm series

This is almost the same algorithm as Euclid's but the remainder p {i+2} has negative sign.

Swell Radio

Swell Radio is a mobile radio streaming application that learns user listening preferences based on listening behavior, community filtering, and a proprietary algorithm.

Swype

In October, 2011, Swype Inc. was acquired by Nuance Communications where the company continued its development and implemented its speech recognition algorithm, Dragon Dictation.

TeamViewer

TeamViewer uses RSA private/public key exchange (2048-bit) and AES (256-bit) session encryption.

Vincenty

Vincenty's formulae, a fast algorithm to calculate the distance between two latitude/longitude points

WinRAR

Since version 3.60 (August 2006), WinRAR includes a multithreaded version of the compression algorithm, which improves compression speed on systems with multiple, dual-core, or Hyper-threading-enabled CPUs.

Zero-K

Zero-K run on Spring engine and by 2013 the engine now include an alternative pathfinding algorithm and multi-core support that aim to address this performance issue.


see also