About fault tolerance in a distributed system. Using the metaphor of a number of Byzantine generals have to come to a consensus of action, while the communication may not be accurate. For example, the sender of a message may be a traitor such that the message may be different to...
[more]
Tupaj et al (1996) Extracting Tabular Information From Text Files
A paper on how to identify and extract tables from scanned text documents. The
author describe the whole process as four phrases: (1) isolate potential table
areas, (2) OCR, (3) isolate the beginning and end of the tables, (4) isolate
table components, i.e., header, cells, footer.
[more]
Encrypting a file with OpenSSL
A natural question from using SSH for a while is whether we
can reuse the SSH authentication key for other use, say, encrypting a file. The
answer is affirmative in OpenSSL but it is not straightforward.
[more]
"Advanced" OpenSSH
I’ve written something about SSH and here are more, on authentication, tunnelling and some other.
[more]
Thinking cycle of growth
I was reading a book on PDCA the day before and come across a Japanese web page
on thinking cycle of growth.
[more]