First Page | Document Content | |
---|---|---|
![]() Date: 2009-12-07 16:22:51Cryptographic hash functions B-tree Computing Computer programming Hash tree Hash function B+ tree Trie Binary tree Hashing Error detection and correction Cryptography | Add to Reading List |
![]() | Cooperative XPath Caching Kostas Lillis and Evaggelia Pitoura Computer Science Department University of Ioannina, Greece {klillis,DocID: 1rqvV - View Document |
![]() | The Architecture of PIER: an Internet-Scale Query Processor Ryan Huebsch, Brent Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica and Aydan R. Yumerefendi UC BerkeleyDocID: 1r0TY - View Document |
![]() | Microsoft Word - article4.docDocID: 1qZW6 - View Document |
![]() | BATON: A Balanced Tree Structure for Peer-to-Peer Networks H.V. Jagadish 1,2DocID: 1qq4a - View Document |
![]() | 1242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 17,DocID: 1qadb - View Document |