<--- Back to Details
First PageDocument Content
Information retrieval / Search algorithms / Information science / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Universal hashing / Locality-sensitive hashing
Date: 2016-03-06 16:06:05
Information retrieval
Search algorithms
Information science
Hashing
Cryptographic hash functions
Error detection and correction
Hash function
Hash table
Universal hashing
Locality-sensitive hashing

Algorithms and Data Structures Winter TermExercises for UnitLet U = {0, 1, . . . , K − 1}, let p ≥ K be a prime number, and let 0 < t < K. For 0 ≤ a, b < p define

Add to Reading List

Source URL: www-tcs.cs.uni-sb.de

Download Document from Source Website

File Size: 55,75 KB

Share Document on Facebook

Similar Documents

CS378, MA375T, PHY341  Homework 1 Homework 1 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 1 Homework 1 Introduction to Quantum Information Science

DocID: 1xVZC - View Document

CS378, MA375T, PHY341  Homework 2 Homework 2 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 2 Homework 2 Introduction to Quantum Information Science

DocID: 1xVYW - View Document

GOV200X – The Politics of Plague Worcester Polytechnic Institute Social Science and Policy Studies Department Sample Syllabus Course Information Professor Patricia Stapleton

GOV200X – The Politics of Plague Worcester Polytechnic Institute Social Science and Policy Studies Department Sample Syllabus Course Information Professor Patricia Stapleton

DocID: 1xVN2 - View Document

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

DocID: 1xVHD - View Document

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

DocID: 1xVEY - View Document