Hash table

Results: 1003



#Item
511Business / Logistics / Supply chain management / Automatic identification and data capture / Radio-frequency identification / EPCglobal / Track and trace / Traceability / Distributed hash table / Technology / Management / Identifiers

Cost Model for RFID-based Traceability Information Systems Miguel L. Pardal and Jos´e Alves Marques Department of Computer Science and Engineering Instituto Superior T´ecnico, Technical University of Lisbon, Portugal E

Add to Reading List

Source URL: web.ist.utl.pt

Language: English - Date: 2012-10-15 14:15:50
512Artificial intelligence / Error detection and correction / Hash function / Hash table / Television advertisement / Cryptographic hash function / Search algorithms / Hashing / Information science

Practical Advertisement Detection in Video Du,Jiaen ([removed]) 1. Background Usually there are many advertisements in television. This is not efficient for video

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2010-12-14 03:20:21
513Computing / Information science / Hash join / Hash table / Hash function / Bloom filter / Trie / Cryptographic hash function / Database index / Hashing / Search algorithms / Data management

Memory-Efficient Hash Joins

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-11-12 16:58:02
514Distributed computing / Chord / Distributed hash table / Pastry / Tapestry / Freenet / Trie / Network topology / Peer-to-peer / Distributed data storage / Computing / Concurrent computing

Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Ion Stoica† , Robert Morris‡ , David Liben-Nowell‡ , David R. Karger‡ , M. Frans Kaashoek‡ , Frank Dabek‡ , Hari Balakrishnan‡ Abstra

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2003-10-10 14:30:42
515Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2013-12-11 18:35:17
516Distributed computing / Chord / Distributed hash table / Peer-to-peer / Node / Scalability / Consistent hashing / Shared nothing architecture / Routing / Distributed data storage / Computing / Concurrent computing

Scaling a Highly-Available DBMS beyond a Dozen Nodes Svein Erik Bratsberg Department of Computer and Information Science Norwegian Universitity of Science and Technology N-7491 Trondheim, Norway

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-12-12 14:17:11
517Search algorithms / Analysis of algorithms / Probability theory / Hashing / Approximate counting algorithm / Randomized algorithm / Bloom filter / Estimation theory / Hash table / Mathematics / Applied mathematics / Theoretical computer science

Counting by Coin Tossings Philippe Flajolet Algorithms Project, INRIA-Rocquencourt, 78153 Le Chesnay (France) [removed] Abstract. This text is an informal review of several randomized algorithms that ha

Add to Reading List

Source URL: algo.inria.fr

Language: English - Date: 2004-09-28 13:04:59
518Internet / Distributed hash table / Tapestry / Pastry / Chord / Routing / Kademlia / Peer-to-peer / Anycast / Distributed data storage / Computing / Network architecture

Towards a Common API for Structured Peer-to-Peer Overlays     

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2003-10-10 15:03:03
519Cryptographic software / Computer law / Password cracking / Password / Rainbow table / Salt / Key stretching / Crypt / Bcrypt / Cryptography / Cryptographic hash functions / Key management

Password Hashing Competition - Survey and Benchmark George Hatzivasilis1 , Ioannis Papaefstathiou1 , and Charalampos Manifavas2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-22 05:43:55
520Distributed hash table / Chord / Computer architecture / Peer-to-peer / Gossip protocol / Gnutella / Flooding / Kademlia / Distributed data storage / File sharing networks / Computing

Gossip-based Search Selection in Hybrid Peer-to-Peer Networks M. Zaharia and S. Keshav School of Computer Science, University of Waterloo, Waterloo, ON, Canada [removed], [removed] SUMMARY We present GAB,

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2014-02-02 20:47:33
UPDATE