Hash table

Results: 1003



#Item
581Computer architecture / Overlay network / Distributed hash table / Pastry / Routing / Kademlia / Chord / Peer-to-peer / Node / Distributed data storage / Computing / Concurrent computing

2-2 Design and Phase-1 Development of Secure Overlay Networks KADOBAYASHI Youki, NAKAO Koji, and TAKIZAWA Osamu Recently, overlay networks are gaining attention as a means to eliminate single point of failure in the appl

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:55:32
582Search algorithms / Ensemble learning / Resampling / Bootstrapping / SAS / Bootstrap aggregating / Hash function / Hash table / Algorithm / Statistics / Computational statistics / Statistical inference

Much Faster Bootstraps Using SAS® John Douglas (“J.D.”) Opdyke,* DataMineIt Abstract Seven bootstrap algorithms coded in SAS® are compared. The fastest (“OPDY”), which uses no modules beyond Base SAS®, achieve

Add to Reading List

Source URL: www.datamineit.com

Language: English - Date: 2010-11-02 10:36:52
583Concurrent computing / Software / Distributed hash table / File sharing / Kademlia / BitTorrent / Vanish / Peer-to-peer / Sybil attack / Distributed data storage / Computing / File sharing networks

For more information and the most recent version of this paper, visit http://z.cs.utexas.edu/users/osa/unvanish/ Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs Scott Wolchok†1 , Owen S. Hofmann†2 ,

Add to Reading List

Source URL: z.cs.utexas.edu

Language: English - Date: 2009-09-29 13:35:27
584Information science / Artificial intelligence / Error detection and correction / Hash functions / Hash table / Cryptographic hash functions / Trie / Linked list / Perfect hash function / Hashing / Search algorithms / Information retrieval

VISUAL BASIC COLLECTIONS AND HASH TABLES Thomas Niemann Preface

Add to Reading List

Source URL: epaperpress.com

Language: English - Date: 2014-07-10 21:19:43
585Hashing / System software / Error detection and correction / Hash table / Hash function / Computer virus / Hash list / COM file / Ar / Computing / Search algorithms / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS MAKING A HASH OF THINGS Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 17:18:26
586Routing algorithms / Routing protocols / Wireless networking / Distributed data storage / Trellis / Routing / Network topology / Geographic routing / Distributed hash table / Electronics / Computing / Network architecture

Trellis-Based Virtual Regular Addressing Structures in Self-organized Networks Julien Ridoux1 , Anne Fladenmuller1 , Yannis Viniotis2 , and Kav´e Salamatian1 1 LIP6 - UPMC, 8, rue du C. Scott, 75015 Paris, France

Add to Reading List

Source URL: www.synclab.org

Language: English - Date: 2015-02-14 01:17:26
587Software / NTLM / Pass the hash / Pwdump / Rainbow table / Password / Samba / Integrated Windows Authentication / Security Accounts Manager / Computer security / Computer network security / Cyberwarfare

Post-Exploitation with WCE v1.2 Pass-the-Hash. Pass-the-ticket & more… Date: 01-07-2011 Author: Hernan Ochoa

Add to Reading List

Source URL: www.ampliasecurity.com

Language: English - Date: 2015-01-12 10:16:16
588Public engagement / Impact assessment / Policy / Politics / Program evaluation / Advocacy evaluation / Evaluation / Evaluation methods / Sociology

ROUND-TABLE DISCUSSION SUMMARY Science and Society programmes – what are the best ways of measuring success? Held at the British Academy on 16th October, 2014. hash tag #fstscienceandsociety Chair:

Add to Reading List

Source URL: www.foundation.org.uk

Language: English - Date: 2014-10-21 05:45:31
589Semantic similarity / Search engine indexing / Hash function / Principal component analysis / Hash table / Relevance / Trie / Video search engine / Information science / Information retrieval / Search algorithms

1 Scalable Mobile Video Retrieval with Sparse Projection Learning and Pseudo Label Mining Guan-Long Wu, Yin-Hsi Kuo, Tzu-Hsuan Chiu, Winston H. Hsu, and Lexing Xie Abstract

Add to Reading List

Source URL: users.cecs.anu.edu.au

Language: English - Date: 2013-08-18 10:17:33
590Distributed data storage / Trellis / File sharing networks / Routing / Node / Network topology / Topology / Convolutional code / Distributed hash table / Electronics / Data transmission / Computing

Beyond the Tree Structure: a new way to configure nodes in SONs Julien Ridoux Anne Fladenmuller Yannis Viniotis

Add to Reading List

Source URL: www.synclab.org

Language: English - Date: 2015-02-14 01:17:26
UPDATE