Hash list

Results: 236



#Item
91Computing / File sharing networks / Data management / Software / Information / Hash tree / Bitcoin / Hash list / Peer-to-peer / Hashing / Cryptographic hash functions / Error detection and correction

Storj A Peer-to-Peer Cloud Storage Network Shawn Wilkinson ([removed]) Contributors: Tome Boshevski ([removed]), Josh Brandoff ([removed]), and Vitalik Buterin ([removed])

Add to Reading List

Source URL: storj.io

Language: English - Date: 2014-12-15 17:03:53
92Sorting algorithms / Priority queue / Fibonacci heap / Binary heap / Heap / D-ary heap / Linked list / Pointer / Hash table / Computer programming / Mathematics / Computing

Lower and Upper Bounds on Obtaining History Independence Niv Buchbinder and Erez Petrank ?

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:56
93Cache / Cache algorithms / Linked list / Hash table / Binomial heap / Lookup table / Trie / Heap / Binary heap / Computing / Computer programming / Least frequently used

An O(1) algorithm for implementing the LFU cache eviction scheme Prof. Ketan Shah Anirban Mitra

Add to Reading List

Source URL: dhruvbird.com

Language: English - Date: 2011-04-04 04:36:14
94CTC / SHA-2 / Computer programming / C / Computing / Cryptographic hash functions / Software engineering

Microsoft Word - CTC September Project Allocations List.docx

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2012-02-22 15:50:47
95Applied mathematics / Analysis of algorithms / Search algorithms / Heap / Binary heap / Linked list / Big O notation / Hash table / Merge sort / Mathematics / Theoretical computer science / Sorting algorithms

March 12, [removed]Spring 2008 Quiz 1 Introduction to Algorithms Massachusetts Institute of Technology

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2008-10-13 12:54:43
96SHA-2 / Computing / Cryptographic hash functions / CTC / SHA-1

JANUARY 2014 CTC PROJECT ALLOCATION LIST Project # Allocation Amount Recipient RTPA/CTC County

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-01-30 15:55:59
97Abstract data types / Computer programming / Array data type / Associative array / Pointer / List / Hash table / Reference / C / Data types / Computing / Software engineering

Collections Programming Topics Contents About Collections 6

Add to Reading List

Source URL: developer.apple.com

Language: English - Date: 2015-02-09 21:31:59
98Computer programming / Lock / Software transactional memory / Non-blocking algorithm / Mutual exclusion / Hash table / Linked list / Binary search tree / Deadlock / Concurrency control / Computing / Data management

TRANSACT[removed]MSpec: A Design Pattern for Concurrent Data Structures ∗ Lingxiang Xiang Michael L. Scott

Add to Reading List

Source URL: www.cs.rochester.edu

Language: English - Date: 2012-02-15 11:38:37
99Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [removed] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.organicdesign.co.nz

Language: English - Date: 2011-06-18 04:34:18
100Cryptography / Data management / Cryptographic hash functions / Error detection and correction / Checksum / Hash list / Inode / File system / Hash function / Computing / Disk file systems / Hashing

Enhancing File System Integrity Through Checksums Gopalan Sivathanu, Charles P. Wright, and Erez Zadok Stony Brook University Technical Report FSL-04-04

Add to Reading List

Source URL: www.fsl.cs.sunysb.edu

Language: English - Date: 2012-09-07 11:07:01
UPDATE