Hash function

Results: 1800



#Item
951Computing / Data / SQL / Search algorithms / Query languages / Database / Hash function / View / Data management / Database management systems / Database theory

SHAKER OVERVIEW Researcher Agency Shaker

Add to Reading List

Source URL: www.doe.virginia.gov

Language: English - Date: 2012-11-09 14:29:13
952Distributed revision control systems / Cryptographic hash functions / Git / Repo / Error detection and correction / Binary large object / SHA-1 / Distributed revision control / Hash function / Computer programming / Software / Computing

August 22, 2014 New Views on your History with git replace Christian Couder [removed]

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-08-17 17:20:21
953SQL / Information / Relational model / Query optimizer / Relational database / Sort-merge join / Hash join / Tuple / Hash function / Data management / Data / Database management systems

Eddies: Continuously Adaptive Query Processing Ron Avnur Joseph M. Hellerstein University of California, Berkeley [removed], [removed]

Add to Reading List

Source URL: db.cs.berkeley.edu

Language: English - Date: 2000-03-01 04:02:01
954Hashing / Search algorithms / Random oracle / Preimage attack / Hash function / Collision resistance / SHA-1 / Oracle machine / Collision / Cryptography / Cryptographic hash functions / Error detection and correction

Microsoft Word - Scott Contini.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:08:36
955Join / Hash function / Query plan / Data / SQL / Database management systems / Data management

Humboldt-Universit¨ at zu Berlin Department of Computer Science Dynamic Join Algorithm Switching at Query Execution Time

Add to Reading List

Source URL: www.dbis.informatik.hu-berlin.de

Language: English - Date: 2011-04-12 07:23:23
956Linear algebra / Keccak / NIST hash function competition / Matrices / Linear map / Exponential function / Transformation matrix / Weight / Kernel / Mathematics / Algebra / Transformation

Characterization of Column Parity Kernel and Differential Cryptanalysis of Keccak Yin Tan, Kalikinkar Mandal and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {y24tan,kmanda

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-01-19 20:48:05
957Search algorithms / Error detection and correction / Hash function / Random oracle / Oracle machine / Preimage attack / Elliptic curve only hash / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN To:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:10:52
958Computer vision / Information retrieval / Image processing / Dimension reduction / Locality-sensitive hashing / SURF / Nearest neighbor search / Video copy detection / Hash function / Search algorithms / Information science / Artificial intelligence

Nanjing University in TRECVID 2009_final

Add to Reading List

Source URL: www-nlpir.nist.gov

Language: English - Date: 2010-04-14 09:58:20
959MD5 / Cryptographic hash function / Computer data storage / Internet / Electronics / Email / Computing / Backup

Page 30 Southwestern Archivist Taming the Wild LISTSERV; or, How to Preserve Specialized E-Mail Lists By Lisa M. Schmidt • MATRIX: The Center for Humane Arts, Letters, and Social Sciences Online, Michigan State Univer

Add to Reading List

Source URL: www.h-net.org

Language: English - Date: 2008-09-08 09:42:38
960SHA-1 / Digital Signature Algorithm / Secure Hash Standard / Data Encryption Standard / Hash function / MD4 / SHA-2 / MD5 / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS[removed]Secure Hash Standard Page 1 of 21 Return to the FIPS Home Page

Add to Reading List

Source URL: www.sos.state.co.us

Language: English - Date: 2014-10-31 23:49:20
UPDATE