Hash function

Results: 1800



#Item
281Information retrieval / Nearest neighbor search / K-nearest neighbor algorithm / Search engine indexing / Hash function / Hash table / K-d tree / InfiniBand / Distributed hash table / Information science / Computing / Search algorithms

Building A Scalable Multimedia Search Engine Using Infiniband Qi Chen1 , Yisheng Liao2 , Christopher Mitchell2, Jinyang Li2 , and Zhen Xiao1 1 Department 2 Department of Computer Science, Peking University

Add to Reading List

Source URL: news.cs.nyu.edu

Language: English - Date: 2014-06-11 16:04:37
282Ajax / Persistence / Serialization / World Wide Web / JSON / Record / Form / POST / Hash function / Computing / Software engineering / JavaScript

Prototype and script.aculo.us

Add to Reading List

Source URL: media.pragprog.com

Language: English - Date: 2008-02-25 23:58:26
283Vector space model / Latent semantic analysis / Latent semantic indexing / Tf*idf / Search engine indexing / Learning to rank / Relevance feedback / Hash function / Probabilistic latent semantic analysis / Information science / Information retrieval / Science

Supervised Semantic Indexing Bing Bai† , Jason Weston† , David Grangier† , Ronan Collobert† , Yanjun Qi† , Kunihiko Sadamasa† , Olivier Chapelle? , Kilian Weinberger? † NEC Labs America, Princeton NJ, USA ?

Add to Reading List

Source URL: ronan.collobert.com

Language: English - Date: 2009-09-03 12:22:35
284Key management / Digital signature / Electronic signature / Non-repudiation / Public key certificate / Signature / CAdES / Cryptographic hash function / Digital signatures and law / Cryptography / Public-key cryptography / Notary

Abhinav International Monthly Refereed Journal of Research In Management & Technology Volume II, March’13 ISSN –

Add to Reading List

Source URL: www.abhinavjournal.com

Language: English - Date: 2013-12-17 06:25:33
285Hashing / Search algorithms / Schnorr signature / Digital signature / Random oracle / One-way function / Universal hashing / RSA / Hash function / Cryptography / Public-key cryptography / Cryptographic hash functions

Proceedings of Selected Areas in Cryptography ’98 (August 17–18, 1998, Kingston, Ontario, Canada) S. Tavares and H. Meijer Eds. Springer-Verlag, LNCS 1556, pages 72–80. Computational Alternatives to Random Number G

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-06-27 15:00:00
286Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:08:49
287Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: bravenewcoin.com

Language: English - Date: 2014-07-15 20:21:51
288Vector space model / Learning to rank / Ranking SVM / Tf*idf / Hash function / Search engine indexing / N-gram / Supervised learning / Latent semantic indexing / Information science / Information retrieval / Science

Noname manuscript No. (will be inserted by the editor) Learning to Rank with (a Lot of ) Word Features Bing Bai · Jason Weston · David Grangier · Ronan Collobert · Kunihiko Sadamasa ·

Add to Reading List

Source URL: ronan.collobert.com

Language: English - Date: 2009-09-30 13:22:01
289Spanning tree / Parallel computing / Message Passing Interface / Search algorithms / Hash function / Time complexity / MPICH / Theoretical computer science / Concurrent computing / Computing

Scalable Algorithms for Constructing Balanced Spanning Trees on System-ranked Process Groups Akhil Langer, Ramprasad Venkataraman, and Laxmikant Kale Department of Computer Science University of Illinois at Urbana-Champa

Add to Reading List

Source URL: charm.cs.illinois.edu

Language: English - Date: 2012-09-08 17:52:14
290Coding theory / Finite fields / Information / Cryptography / Network coding / Hash function / Hash list / Very smooth hash / Homomorphic signatures for network coding / Hashing / Cryptographic hash functions / Error detection and correction

1 On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li∗ John C.S. Lui+

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-05-19 23:15:34
UPDATE