Cryptographic hash function

Results: 1121



#Item
351Hash function / Artificial intelligence / Information retrieval / Information science / Cryptographic hash functions / Regression analysis / Search algorithms / Hashing / Error detection and correction

Case Study 1: Estimating Click Probabilities Tackling  an  Unknown  Number  of   Features  with  Sketching     Machine  Learning  for  Big  Data       CSE547/STAT548,  

Add to Reading List

Source URL: courses.cs.washington.edu

Language: English - Date: 2015-04-06 19:08:06
352Artificial intelligence / Error detection and correction / Hash function / Hash table / Television advertisement / Cryptographic hash function / Search algorithms / Hashing / Information science

Practical Advertisement Detection in Video Du,Jiaen ([removed]) 1. Background Usually there are many advertisements in television. This is not efficient for video

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2010-12-14 03:20:21
353Hash function / Artificial intelligence / Information retrieval / Information science / Cryptographic hash functions / Regression analysis / Search algorithms / Hashing / Error detection and correction

Case Study 1: Estimating Click Probabilities Tackling  an  Unknown  Number  of   Features  with  Sketching     Machine  Learning  for  Big  Data       CSE547/STAT548,  

Add to Reading List

Source URL: courses.cs.washington.edu

Language: English - Date: 2015-04-07 15:32:58
354Computing / SHA-2 / London / W postcode area / Bitcoin / Cryptographic nonce / Crypt / Hash function / Cryptography / Cryptographic hash functions / Software

GOLDSTRIKETM 1: COINTERRA’S FIRST GENERATION CRYPTO-CURRENCY PROCESSOR FOR BITCOIN MINING MACHINES Javed Barkatullah, Ph.D., MBA Timo Hanke, Ph.D.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-12 14:05:46
355Computing / Information science / Hash join / Hash table / Hash function / Bloom filter / Trie / Cryptographic hash function / Database index / Hashing / Search algorithms / Data management

Memory-Efficient Hash Joins

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-11-12 16:58:02
356Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2013-12-11 18:35:17
357Collision attack / Preimage attack / Spectral Hash / Hash function / Collision / NIST hash function competition / Oracle machine / Cryptography / Cryptographic hash functions / Random oracle

Preimage Attacks Against Spectral Hash and PTX Functions. Ethan Heilman Boston University ABSTRACT

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2015-03-07 12:34:01
358Artificial intelligence / Locality-sensitive hashing / Hash function / Hash table / Nearest neighbor search / Tiny Encryption Algorithm / Cryptographic hash function / Search algorithms / Information science / Information retrieval

SK-LSH : An Efficient Index Structure for Approximate Nearest Neighbor Search Yingfan Liu‡ , Jiangtao Cui‡ , Zi Huang§ , Hui Li‡ , Heng Tao Shen§ ‡ School of Computer, Xidian University, China

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-04-05 17:13:23
359IPv6 / Computing / Network protocols / Internet Protocol / Mobile IP / Cryptographic nonce / Cryptographic hash function / Network architecture / Cryptography / OSI protocols

Mobile Location Changing version 1 (MLCv1)

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-12-12 14:23:33
360Information retrieval / Information science / Computing / Hash join / Query optimizer / Sort-merge join / Hash function / Hash table / Cryptographic hash function / Search algorithms / Hashing / Sorting algorithms

Memory Footprint Matters: Efficient Equi-Join Algorithms for Main Memory Data Processing Spyros Blanas and Jignesh M. Patel University of Wisconsin–Madison {sblanas,jignesh}@cs.wisc.edu

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2014-02-20 11:47:23
UPDATE