Definitions
from The Century Dictionary.
- In pairs.
from Wiktionary, Creative Commons Attribution/Share-Alike License.
- adjective Occurring in pairs; two
at a time . - adverb Arranged in pairs.
Etymologies
from Wiktionary, Creative Commons Attribution/Share-Alike License
Support
Help support Wordnik (and make this page ad-free) by adopting the word pairwise.
Examples
-
You start off by calling their pairwise homology hits “significant”, so I think you’ve undercut that argument.
-
She places an emphasis on surrounding yourself with smart people, which she assesses via "pairwise comparisons."
Angie Chang: 5 Tips From Silicon Valley's Female Leaders Angie Chang 2011
-
Among the restrictions required for inclusive fitness theory to work, one is that all interactions must be additive and pairwise.
SuperCooperators Martin A. Nowak 2011
-
Prof. Klein, why fail the authors of the paper [#15] whose summary is "We show the robustness of the Walrasian result obtained in models of bargaining in pairwise meetings." on the "Theory of What?" point? ...
-
Prof. Klein, why fail the authors of the paper whose summary is "We show the robustness of the Walrasian result obtained in models of bargaining in pairwise meetings." on the "Theory of What?" point?
-
She places an emphasis on surrounding yourself with smart people, which she assesses via "pairwise comparisons."
Angie Chang: 5 Tips From Silicon Valley's Female Leaders Angie Chang 2011
-
This is actually pretty neat, but again it doesn't appear to be a weakness in WPA2: the access point then uses the valid pairwise key associated with the Attacker, which is an authorized device on the network, to encrypt the frame received from the Victim and send it on to the presumably authorized destination.
-
The next frame it sends, per usual, goes to the original bona fide access point, where it's encrypted, also per usual, with the pairwise key shared by the Victim and the access point.
-
The section you want to quote begins "Moreover, Table 1 provides evidence that a positive bias has not simply been transferred from poorly sited stations to well sited stations during the pairwise adjustment procedures."
Tom's trick and experimental design EliRabett 2010
-
The first uses what AirTight now alternately refers to as a "vulnerability" or a "limitation" in the 802.11 specification: a shared encryption key called the group temporal key (GTK), shared by all clients connected to the same access point, can't detect an address spoofing attempt (the pairwise keys, which are used to scramble data between a given client and the access point, can).
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.