Hash table

Results: 1003



#Item
381Sorting algorithms / Search algorithms / Cross-platform software / Theoretical computer science / Hash table / Hash function / Algorithm / C++ / Tree traversal / Computing / Computer programming / Software engineering

NATIONAL ENGINEERING COLLEGE

Add to Reading List

Source URL: www.nec.edu.in

Language: English - Date: 2013-08-14 00:39:49
382Distributed computing / Distributed hash table / Peer-to-peer / P-Grid / Pastry / Chord / Scalability / Database / JXTA / Distributed data storage / Computing / Concurrent computing

pNear: combining Content Clustering and Distributed Hash Tables Ronny Siebes Vrije Universiteit Amsterdam, The Netherlands

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2005-08-11 08:06:38
383Software engineering / Hashing / Abstract data types / Data types / Hash table / Hash function / Set / List / Append / Search algorithms / Computing / Computer programming

CS109A Notes for LectureRepresenting Sets 1. List. Simple, O(n) dictionary operations. 2. Binary Search Tree. O(log n) average dictionary operations. Supports other operations like range queries, sorting. 3. Char

Add to Reading List

Source URL: infolab.stanford.edu

Language: English - Date: 2008-09-19 00:58:20
384Distributed hash table / Chord / Internet / Peer-to-peer / Routing table / Routing / Sybil attack / PlanetLab / Kademlia / Distributed data storage / Computing / Network architecture

Wh¯anau: A Sybil-proof Distributed Hash Table Chris Lesniewski-Laas M. Frans Kaashoek MIT CSAIL, Cambridge, MA, USA {ctl,kaashoek}@mit.edu

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:18
385Distributed hash table / Pastry / Tapestry / Peer-to-peer / Gossip protocol / Gnutella / AVL tree / Replication / Trie / Distributed data storage / Computing / Chord

Kelips∗: Building an Efficient and Stable P2P DHT Through Increased Memory and Background Overhead Indranil Gupta, Ken Birman, Prakash Linga, Al Demers, Robbert van Renesse Cornell University, Ithaca, NY, USA {gupta, k

Add to Reading List

Source URL: iptps03.cs.berkeley.edu

Language: English - Date: 2003-02-10 13:10:45
386Computing / File sharing / Concurrent computing / Semantic similarity / Semantic Web / Information retrieval / Social peer-to-peer processes / Distributed hash table / Semantic matching / Distributed data storage / Science / Peer-to-peer

Peer Selection in Peer-to-Peer Networks with Semantic Topologies Peter Haase1 , Ronny Siebes2 , Frank van Harmelen2 1 Institute AIFB, University of Karlsruhe, DKarlsruhe, Germany

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2004-06-25 05:46:18
387File sharing / Peer-to-peer / Distributed hash table / P-Grid / Pastry / Social peer-to-peer processes / Chord / Overlay network / Semantic similarity / Distributed data storage / Computing / Concurrent computing

Under consideration for publication in Knowledge and Information Systems Expertise-based Peer Selection in Peer-to-Peer Networks Peter Haase1 , Ronny Siebes2 and Frank van Harmelen2 1 Institute

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2006-04-08 08:17:50
388Hashing / Hash function / SHA-2 / Key stretching / Crypt / Password / One-way compression function / Tabulation hashing / Hash table / Cryptography / Cryptographic hash functions / Search algorithms

STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2014-02-01 12:00:10
389File sharing networks / Hashing / Peer-to-peer / Distributed hash table / Computing / Cryptography / Cryptographic hash function / Routing / Science / Distributed data storage / Reputation management / Sybil attack

Christopher T Lesniewski-Laas Updated March 2010 Contact Information

Add to Reading List

Source URL: lesniewski.org

Language: English - Date: 2010-03-13 22:43:23
390Peer-to-peer / Computing / Extensible Storage Engine / Lock / Data management / Distributed data storage / Distributed hash table / File sharing

Brief Announcement: Building Data Structures on Untrusted Peer-to-Peer Storage with Per-participant Logs Benjie Chen, Thomer M. Gil, Athicha Muthitacharoen, and Robert Morris {benjie,thomer,athicha,rtm}@lcs.mit.edu MIT L

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2003-04-24 21:27:09
UPDATE