Hash function

Results: 1800



#Item
231Information science / Linked list / Hash table / Stack / Hash function / Cuckoo hashing / Time complexity / Heap / Search algorithms / Theoretical computer science / Applied mathematics

A heaviest hitters limiting mechanism with O(1) time complexity for sliding-window data streams Remous-Aris Koutsiamanis and Pavlos S. Efraimidis Department of Electrical and Computer Engineering Democritus University of

Add to Reading List

Source URL: www.spice-center.org

Language: English - Date: 2012-12-19 06:11:27
232Artificial intelligence / Nearest neighbor search / Hash function / Hash table / Information science / Search algorithms / Information retrieval

2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware Interval-Based Nearest Neighbor Queries Over Sliding Windows from Trajectory Data Yan Huang, Chengyang Zhang Department of

Add to Reading List

Source URL: www.cse.unt.edu

Language: English - Date: 2013-08-12 14:28:22
233Cryptographic hash function / Crypt / Cyberwarfare / Computer security / Security / Cryptography / Public-key cryptography / File system

CS140 Operating Systems and Systems Programming Final Exam December 12, 2005 Name: (please print)______________________________ In recognition of and in the spirit of the Stanford University Honor Code, I certify

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:12
234Mathematics / Hash function / Locality-sensitive hashing / Hash table / Nearest neighbor search / Hamming weight / Trie / K-d tree / Hamming distance / Search algorithms / Information science / Information retrieval

Fast Search in Hamming Space with Multi-Index Hashing Mohammad Norouzi Ali Punjani David J. Fleet Department of Computer Science University of Toronto

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2012-06-28 15:40:37
235Structured storage / NoSQL / Database management systems / Gün / Hash function / Emin / Wong / Dbm / Data management / Data / Information

HyperDex A Distributed, Searchable Key-Value Store Robert Escriva† Bernard Wong‡ Emin Gün Sirer†

Add to Reading List

Source URL: hyperdex.org

Language: English - Date: 2013-09-30 21:44:13
236Hash function / Hash House Harriers / Star / Prawn / Hash / Human behavior / Recreation / Food and drink / Narooma /  New South Wales / WACT

Microsoft Word - REGO FORM A. .doc

Add to Reading List

Source URL: www.hhh.asn.au

Language: English - Date: 2015-07-15 18:03:04
237Error detection and correction / Computer file formats / Search algorithms / Cryptographic hash functions / Hash list / Hash function / File system / File format / Windows Registry / Computing / Hashing / System software

SimHash: Hash-based Similarity Detection Caitlin Sadowski University of California, Santa Cruz Greg Levin

Add to Reading List

Source URL: simhash.googlecode.com

Language: English - Date: 2007-12-13 05:28:46
238Artificial intelligence / Hash table / Linear probing / Hash function / Open addressing / Cryptographic hash function / Quadratic probing / SUHA / Hashing / Search algorithms / Information science

Hash Tables: Linear Probing Uri Zwick Tel Aviv University Hashing with open addressing

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2015-05-10 09:08:35
239Error detection and correction / Security / Information / Search algorithms / Fingerprint / Identifiers / Hash function / Public key fingerprint / Rabin–Karp algorithm / Hashing / Cryptography / Cryptographic hash functions

Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer Daniel S. Wilkerson Alex Aiken

Add to Reading List

Source URL: dsw.users.sonic.net

Language: English - Date: 2015-06-08 15:50:28
240Hash function / Baarlo / Error detection and correction / Interhash

Dutch Nash HashregardlessJuly ^

Add to Reading List

Source URL: www.dutchnashnash2014.nl

Language: English - Date: 2012-04-06 15:39:51
UPDATE