Hash function

Results: 1800



#Item
101Hashing / Cryptographic hash functions / Error detection and correction / Web archiving / Digital libraries / Digital preservation / Merkle tree / SHA-1 / Hash function / Wayback Machine / Hash list / Database

Microsoft Word - Indo-US-Workshop-jaja.doc

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Language: English - Date: 2009-05-12 14:48:13
102Electronic documents / Cross-platform software / Gmail / Webmail / Internet privacy / Hashcash / Privacy / Information privacy / Bitcoin / Cryptographic hash function / Digital signature / Email

CPSCExam 2 // December 1, 2011 Answer all of the questions. Please remember to write your name, the course number, and today’s date on all blue books that you submit. This is a closed-book exam; please do n

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2011-12-12 14:53:47
103B-tree / Search algorithms / Quadtree / Grid / Hash function / R-tree / Database / Extensible Storage Engine / B+ tree / Trie

STORAGE METHODS FOR FAST ACCESS TO LARGE CARTOGRAPHIC DATA COLLECTIONS - AN EMPIRICAL STUDY Andreas Kleiner Department of Geography, University of Zurich (Irchel) Winterthurerstrasse 190, CH-8057, Zurich (Switzerland)

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 00:55:46
104Search algorithms / Nearest neighbor search / Music information retrieval / Locality-sensitive hashing / Information retrieval / Document retrieval / Search engine / Hash function / Similarity search / Content-based image retrieval

CompositeMap: a Novel Framework for Music Similarity Measure Bingjun Zhang1 , Jialie Shen2 , Qiaoliang Xiang1 , Ye Wang1 2 1

Add to Reading List

Source URL: www.smcnus.org

Language: English - Date: 2013-09-27 01:18:29
105Search algorithms / Hashing / Hash table / Hash function / Cryptographic hash function / Bin / Trie / Bloom filter / Locality-sensitive hashing

Multiple Aggregations Over Data Streams Rui Zhang† Nick Koudas‡ Beng Chin Ooi†

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2005-06-07 05:36:19
106Routing protocols / Public-key cryptography / Hashing / Cryptography / Key management / Border Gateway Protocol / Cryptographic hash function / Hash chain / Merkle tree / RSA / Man-in-the-middle attack / Autonomous system

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
107Error detection and correction / Hash function

5th round, January 16th , 2016 COCITASK

Add to Reading List

Source URL: hsin.hr

Language: English - Date: 2016-01-18 03:30:00
108Search algorithms / Hashing / Hash function / Hash table / Cuckoo hashing / Cryptographic hash function / Birthday problem / Feature hashing / Tabulation hashing

Nordic Collegiate Programming Contest NCPC 2007 October 6th, 2007 The Problemset A B

Add to Reading List

Source URL: ncpc.idi.ntnu.no

Language: English - Date: 2014-01-20 12:10:57
109Hashing / Search algorithms / Bloom filter / Countmin sketch / Hash table / Hash function / Set / Universal hashing / Filter / RabinKarp algorithm / Feature hashing

CS168: The Modern Algorithmic Toolbox Lecture #2: Approximate Heavy Hitters and the Count-Min Sketch Tim Roughgarden & Gregory Valiant∗ March 30, 2016

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2016-06-04 09:49:43
110Biometrics / Cryptography / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
UPDATE