Hash table

Results: 1003



#Item
261BitTorrent / Concurrent computing / File sharing networks / Vuze / Comet / Vanish / Distributed hash table / Computing / Distributed data storage / Software

Comet: An Active Distributed Key-Value Store Amit Levy 1

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2012-07-22 12:12:57
262Peer-to-peer / Distributed hash table / Search engine indexing / Document retrieval / Term indexing / Full text search / Index term / Social peer-to-peer processes / Inverted index / Information science / Information retrieval / Searching

Beyond term indexing: A P2P framework for Web information retrieval Ivana Podnar, Martin Rajman, Toan Luu, Fabius Klemm, Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique F´ed´erale de Lausa

Add to Reading List

Source URL: lsirpeople.epfl.ch

Language: English - Date: 2006-06-05 15:46:31
263Search algorithms / Sampling / CPU cache / Central processing unit / Computer memory / Computer programming / Hash table / Lookup table / Sample size determination / Computing / Statistics / Cache

Efficient MRC Construction with SHARDS Carl A. Waldspurger, Nohhyun Park, Alexander Garthwaite, and Irfan Ahmad, CloudPhysics, Inc. https://www.usenix.org/conference/fast15/technical-sessions/presentation/waldspurger Th

Add to Reading List

Source URL: cdn1.virtualirfan.com

Language: English - Date: 2015-02-16 23:12:48
264Computer programming / Linked list / Hash table / Trie / Mutual exclusion / Non-blocking algorithm / Compare-and-swap / Software transactional memory / Tree traversal / Concurrency control / Computing / Data management

High Performance Dynamic Lock-Free Hash Tables and List-Based Sets Maged M. Michael IBM Thomas J. Watson Research Center P.O. Box 218 Yorktown Heights NYUSA

Add to Reading List

Source URL: www.research.ibm.com

Language: English - Date: 2004-08-02 14:09:15
265Information / Distributed hash table / Peer-to-peer / Chord / Vanish / Communications protocol / Routing / Distributed data storage / Computing / Data

Adding Query Privacy to Robust DHTs Michael Backes Ian Goldberg Saarland University and MPI-SWS, Germany

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-04-29 17:45:15
266Information science / Artificial intelligence / Error detection and correction / Hash function / Hash table / Trie / Search algorithms / Hashing / Information retrieval

A Probabilisti Dynami Te hnique for the Distributed Generation of Very Large State Spa es W.J. Knottenbelt a;1

Add to Reading List

Source URL: pubs.doc.ic.ac.uk

Language: English - Date: 2011-11-14 07:13:41
267Concurrent computing / File sharing networks / Network architecture / Peer-to-peer / Distributed hash table / ANts P2P / Chord / Overlay network / Connectivity / Computing / Distributed data storage / Software

Combining the use of clustering and scale-free nature of user exchanges into a simple and efficient P2P system⋆ Pierre Fraigniaud 1 , Philippe Gauron 2 , and Matthieu Latapy 3 1

Add to Reading List

Source URL: www.liafa.jussieu.fr

Language: English - Date: 2007-01-17 10:04:36
268Procedural programming languages / Search algorithms / C / Cross-platform software / Hash function / Hash table / ALGOL 68 / Binary tree / Pointer / Computing / Software engineering / Computer programming

Index-1 Index absorption law …………………………………………. abs …………………………………………………….. abstract ………………………………………………...

Add to Reading List

Source URL: www.bluepelicanjava.com

Language: English - Date: 2013-07-12 16:05:39
269Distributed computing / Internet protocols / File sharing networks / File sharing / Internet standards / Distributed hash table / Peer-to-peer / Pastry / PlanetLab / Computing / Concurrent computing / Distributed data storage

Distributed Session Announcement Agents for Real-Time Streaming Applications

Add to Reading List

Source URL: web.sfc.wide.ad.jp

Language: English - Date: 2009-01-26 21:52:49
270Digital signature / Symmetric-key algorithm / Block cipher / Cryptographic hash function / Feistel cipher / PKCS / One-way function / Cipher / Cryptanalysis / Cryptography / Public-key cryptography / Key management

Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-03-20 04:32:08
UPDATE