Hash table

Results: 1003



#Item
331Mathematical logic / Hash table / Hash function / Alert correlation / Predicate / Trie / Logic programming / Database index / Extensible Storage Engine / Search algorithms / Logic / Computing

Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation∗ Peng Ning and Dingbang Xu Department of Computer Science, North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:06
332Data / Distributed data storage / RDF / Metadata / Knowledge representation / Resource Description Framework / Distributed hash table / Shared nothing architecture / Named graph / Data management / Computing / Semantic Web

The current issue and full text archive of this journal is available at www.emeraldinsight.comhtm A survey on self-organized semantic storage

Add to Reading List

Source URL: hannes.muehleisen.org

Language: English - Date: 2011-09-14 12:59:12
333Information retrieval / Artificial intelligence / Hash table / Hash function / Garbage collection / Cryptographic hash function / Double hashing / Hash / Associative array / Hashing / Search algorithms / Information science

Generation-Friendly Eq Hash Tables Abdulaziz Ghuloum and R. Kent Dybvig Department of Computer Science, Indiana University, Bloomington, IN 47408 {aghuloum,dyb}@cs.indiana.edu Abstract

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2012-08-10 19:21:06
334Computer hardware / Computer storage media / Computing / Hashing / Cryptography / Hash table / Hash function / SHA-2 / SHA-1 / Search algorithms / Cryptographic hash functions / Information science

doi:j.diin

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-03 22:33:04
335Hash function / Hash table / Information science / Artificial intelligence / Information retrieval / Stack / Logarithm / Search algorithms / Error detection and correction / Hashing

1 The Tiled Bitmap Forensic Analysis Algorithm Kyriacos E. Pavlou and Richard T. Snodgrass, Senior Member, IEEE Abstract— Tampering of a database can be detected

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2009-04-24 16:55:29
336Distributed hash table / Tapestry / Chord / Routing / Pastry / Peer-to-peer / Flooding / Koorde / Tulip Overlay / Distributed data storage / Computing / Network architecture

Routing Algorithms for DHTs: Some Open Questions Sylvia Ratnasamy () Scott Shenker ()

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2004-08-20 15:06:14
337Data / Transaction processing / Abstract interpretation / Symbolic execution / MIX / Hash table / ATS / CPU cache / Extensible Storage Engine / Computing / Computer memory / Computer programming

R ET C ON: Transactional Repair without Replay Colin Blundell Arun Raghavan Milo M. K. Martin

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2010-04-10 11:24:17
338Semantic similarity / Network topology / Ant colony optimization algorithms / Peer-to-peer / Computing / Clustered file system / Data management / Statistics / Semantic memory / Distributed data storage / Distributed hash table / File sharing

Configuring a Self-Organized Semantic Storage Service H. M¨uhleisen, T. Walther, A. Augustin, M. Harasic & R. Tolksdorf Freie Universit¨at Berlin Department of Computer Science – Networked Information Systems Group K

Add to Reading List

Source URL: hannes.muehleisen.org

Language: English - Date: 2011-05-09 12:04:16
339Distributed hash table / Routing / Tapestry / Pastry / Kademlia / Chord / Geographic routing / Network topology / Koorde / Distributed data storage / Computing / Network architecture

The Impact of DHT Routing Geometry on Resilience and Proximity K. Gummadi∗, R. Gummadi†, S. Gribble‡, S. Ratnasamy§, S. Shenker¶, I. Stoicak, ∗

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2004-08-20 14:52:12
340Digital audio / Distributed hash table / Peer-to-peer / Kademlia / Chord / Pastry / Key-based routing / Koorde / Session Initiation Protocol / Distributed data storage / Computing / Network architecture

P2PNS: A Secure Distributed Name Service for P2PSIP

Add to Reading List

Source URL: doc.tm.uka.de

Language: English - Date: 2008-03-25 09:28:41
UPDATE