Hash function

Results: 1800



#Item
661Hashing / Information science / Jaccard index / Measure theory / MinHash / Bloom filter / Hash function / Hash table / Hamming distance / Search algorithms / Geometry / Logic

Efficient Estimation for High Similarities using Odd Sketches Michael Mitzenmacher Rasmus Pagh

Add to Reading List

Source URL: www.itu.dk

Language: English - Date: 2014-01-30 03:01:41
662Applied mathematics / Mathematics / Software quality / Stack / Software bug / Hash function / Algorithm / KeY / Mathematical optimization / Software testing / Search algorithms / Fuzz testing

Dynamic Test Generation for Large Binary Programs by David Alexander Molnar A.B. (Harvard College[removed]M.S. (University of California, Berkeley) 2006

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
663Mathematics / Search algorithms / Hilbert space / Physics / Error detection and correction / Hash function / Positive-definite kernel / Reproducing kernel Hilbert space / Bloom filter / Mathematical analysis / Hashing / Operator theory

Journal of Machine Learning Research[removed]2637 Submitted 2/09; Revised 8/09; Published[removed]Hash Kernels for Structured Data Qinfeng Shi

Add to Reading List

Source URL: jmlr.csail.mit.edu

Language: English - Date: 2009-11-30 20:25:37
664Chemical nomenclature / Identifiers / Encodings / International Chemical Identifier / Computational chemistry / Chemical table file / InChI Trust / Cryptographic hash function / VE / Chemistry / Science / Cheminformatics

IUPAC International Chemical Identifier (InChI) Programs InChI version 1, software version[removed]September[removed]User’s Guide Last revision date: September 12, 2011

Add to Reading List

Source URL: www.inchi-trust.org

Language: English - Date: 2014-10-20 03:20:55
665Computer programming / Bloom filter / Information science / Hash table / Hash function / Bit array / Set / XTR / Search algorithms / Computing / Hashing

Streaming Quotient Filter: A Near Optimal Approximate Duplicate Detection Approach for Data Streams ∗ Sourav Dutta

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2013-06-29 06:39:15
666Networks / Cybernetics / Neuroscience / Science / Artificial intelligence / Cerebellar Model Articulation Controller / CMAC / Perceptron / Hash function / Neural networks / Computational neuroscience / Network architecture

Chapter 3 The CMAC neural network 3.1

Add to Reading List

Source URL: www.q12.org

Language: English - Date: 2002-03-13 22:49:44
667Information / Database management systems / Search algorithms / Programming paradigms / Database theory / Bloom filter / Hash function / Bin / Stream processing / Computing / Hashing / Information science

Chapter 4 Mining Data Streams Most of the algorithms described in this book assume that we are mining a database. That is, all our data is available when and if we want it. In this chapter, we shall make another assumpt

Add to Reading List

Source URL: infolab.stanford.edu

Language: English - Date: 2014-12-22 14:56:12
668Search algorithms / Cluster analysis / Jaccard index / Hierarchical clustering / Hash function / Statistics / Antivirus software / Malware

BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis Jiyong Jang David Brumley

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
669Information theory / Random number generation / Entropy / Randomness tests / Key / Hash function / Cryptographic hash function / Statistical randomness / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

Entropy Key The Entropy Key is a small, affordable and easily installed high-quality random number generator that attaches to any free USB socket. Along with its two isolated and shielded noise generators, it has a 72M

Add to Reading List

Source URL: www.entropykey.co.uk

Language: English - Date: 2009-09-08 13:12:18
670Artificial intelligence / Locality-sensitive hashing / Nearest neighbor search / Hash function / Hash table / MIPS architecture / MinHash / K-d tree / Search algorithms / Information science / Information retrieval

Asymmetric LSH (ALSH) for Sublinear Time Maximum Inner Product Search (MIPS) Ping Li Department of Statistics and Biostatistics Department of Computer Science Rutgers University

Add to Reading List

Source URL: papers.nips.cc

Language: English - Date: 2015-01-20 13:42:14
UPDATE