Hash function

Results: 1800



#Item
641Randomness / Key management / Fortuna / ISAAC / Linear congruential generator / Cryptographic hash function / Random number generation / Mersenne twister / Advanced Encryption Standard / Cryptography / Pseudorandom number generators / Stream ciphers

Parallel Random Numbers: As Easy as 1, 2, 3 ∗ ∗† John K. Salmon, Mark A. Moraes, Ron O. Dror, and David E. Shaw

Add to Reading List

Source URL: www.thesalmons.org

Language: English - Date: 2011-10-02 11:06:07
642Data / SQL / Relational database management systems / Hashing / Bloom filter / Hash function / Oracle Database / Join / Hash table / Data management / Computing / Database management systems

Bloom Filters Christian Antognini Trivadis AG Zürich, Switzerland Oracle Database uses bloom filters in various situations. Unfortunately, no information about

Add to Reading List

Source URL: antognini.ch

Language: English - Date: 2014-02-21 12:40:39
643Notation / OSI protocols / Character sets / Pattern matching / Unicode / UTF-8 / Regular expression / Hash function / OpenLDAP / Character encoding / Computing / Unicode equivalence

Unicode support in OpenLDAP 2.1 Stig Venaas UNINETT [removed] Intro

Add to Reading List

Source URL: www.openldap.org

Language: English - Date: 2014-07-10 16:44:55
644Suffix tree / Rope / Trie / Suffix array / Search engine indexing / LZ77 and LZ78 / String searching algorithm / Hash function / Kolmogorov complexity / Information science / Information retrieval / Information

MRCSI: Compressing and Searching String Collections with Multiple References Sebastian Wandelt and Ulf Leser Humboldt-Universitat ¨ zu Berlin, Wissensmanagement in der Bioinformatik,

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-12-17 10:07:16
645MD4 / SHA-2 / SHA-1 / RIPEMD / MD5 / Hash function / Keccak / MD2 / Crypt / Error detection and correction / Cryptographic hash functions / Cryptography

CA642: C RYPTOGRAPHY AND N UMBER T HEORY 8 1

Add to Reading List

Source URL: www.computing.dcu.ie

Language: English - Date: 2014-10-30 10:52:49
646Information retrieval / Artificial intelligence / Bloom filter / Cuckoo hashing / Hash table / Hash function / Perfect hash function / Trie / Lookup table / Hashing / Search algorithms / Information science

Cuckoo Filter: Practically Better Than Bloom Bin Fan, David G. Andersen, Michael Kaminsky† , Michael D. Mitzenmacher‡ Carnegie Mellon University, † Intel Labs, ‡ Harvard University {binfan,dga}@cs.cmu.edu, michae

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2015-01-22 13:21:08
647Computing / Cryptographic hash functions / Information retrieval / Information science / Hash function / Database / Hash list / Email / Error detection and correction / Hashing / Search algorithms

ABOUT goTrace is developed by United Nations Office on Drugs and Crime (UNODC). The United Kingdom provided the goTrace Project with seed funding in[removed]This has allowed a prototype to be developed and offered for tri

Add to Reading List

Source URL: www.imolin.org

Language: English - Date: 2015-03-20 06:35:24
648Information science / Artificial intelligence / Error detection and correction / Hash functions / Hash table / Cryptographic hash functions / Trie / Linked list / Perfect hash function / Hashing / Search algorithms / Information retrieval

VISUAL BASIC COLLECTIONS AND HASH TABLES Thomas Niemann Preface

Add to Reading List

Source URL: www.epaperpress.com

Language: English - Date: 2014-07-10 21:19:43
649Information science / Artificial intelligence / Hash table / Hash function / Cryptographic hash function / Trie / Linear probing / Hash list / Rabin–Karp algorithm / Hashing / Search algorithms / Information retrieval

APPROXIMATE MULTIPLE STRING SEARCH Robert Muth and Udi Manber1 Department of Computer Science University of Arizona Tucson, AZ 85721 {muth | udi}@cs.arizona.edu

Add to Reading List

Source URL: webglimpse.net

Language: English - Date: 2002-10-23 23:03:02
650Computing / Data structures / Tree traversal / Hashing / Merkle signature scheme / Tree / B-tree / Cryptographic hash function / R-tree / Binary trees / Cryptography / Graph theory

Structural Signatures for Tree Data Structures Ashish Kundu Elisa Bertino Department of Computer Science, Purdue

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2008-10-22 09:22:53
UPDATE