Hash

Results: 3740



#Item
141Computing / Transaction processing / Concurrency control / Data management / Information science / Databases / Lock / Linearizability / Hash table / File locking / Unix signal / Serializability

SPECIAL SECTION DISTRIBUTED PROGRAMMING IN ARGU!S Argus-a programming language and system developed to support the implementation and execution of distributed programs-provides mechanisms that help programmers cope with

Add to Reading List

Source URL: nil.csail.mit.edu

Language: English - Date: 2015-01-05 06:37:33
142Information science / Information retrieval / Search algorithms / Hashing / Information / MinHash / Hash table / Hash function / Association rule learning / Pearson product-moment correlation coefficient / Apriori algorithm / Bloom filter

Finding Highly Correlated Pairs Efficiently with Powerful Pruning ∗ Joan Feigenbaum

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2006-08-31 13:51:39
143English phonology / Latin alphabets

By Way of Dedicatin.:; Vol.ltUo.4, FelJruary 27, 1936: NU7S TO BElillIE LAZZ.A.R.0 FOR TONS AND TONS OF HASH Aim.AVZR3~RY

Add to Reading List

Source URL: www.inportercounty.org

Language: English - Date: 2015-07-19 09:01:36
144Cryptography / Cryptographic hash functions / Error detection and correction / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / SHA-2 / Hash function / SHA-1 / Block cipher / Galois/Counter Mode

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-05 11:52:34
145Computing / Concurrent computing / Parallel computing / Hadoop / Apache Software Foundation / Query languages / Cloud infrastructure / Apache Hadoop / Data-intensive computing / MapReduce / Pig / Hash join

Hyracks: A Flexible and Extensible Foundation for Data-Intensive Computing Vinayak Borkar, Michael Carey, Raman Grover, Nicola Onose, Rares Vernica Computer Science Department, University of California, Irvine Irvine, CA

Add to Reading List

Source URL: asterixdb.ics.uci.edu

Language: English - Date: 2013-06-06 15:43:58
146Cryptography / Error detection and correction / E-commerce / RSA / Digital signature forgery / Digital signature / EMV / Optimal asymmetric encryption padding / Hamming weight / Hash function / Byte

Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-10 09:46:08
147Geography of California / California / Geography of the United States / Lake Tahoe / California Community Colleges System / Lake Tahoe Community College

LTSC CM Monthly Meeting | Tuesday July 22, 2014 | Noon-2:00pm Lake Tahoe Community College, Aspen Room (L103) Attending: Rebecca Bryson, Chris Carney, Sherry Hao, Steve Hash, Aaron McVean, David Reichel, Pete Fink, Morga

Add to Reading List

Source URL: sustainabilitycollaborative.org

Language: English - Date: 2014-08-04 19:49:16
148Search algorithms / Information science / Information retrieval / Mathematics / Nearest neighbor search / Locality-sensitive hashing / K-nearest neighbors algorithm / Hash function / Hash table / Curse of dimensionality / Similarity search

Selective Hashing: Closing the Gap between Radius Search and k-NN Search Jinyang Gao‡ H. V. Jagadish§

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2015-06-06 09:21:03
149Concurrency control / Computing / Computer programming / Concurrency / Software engineering / Synchronization / Lock / File locking / Monitor / Parallel computing / Deadlock / Hash table

More synchronization mechanisms • DEADLOCK • READERS/WRITER LOCKS • CONDITION VARIABLES

Add to Reading List

Source URL: twiki.di.uniroma1.it

Language: English - Date: 2015-11-24 06:37:50
150Quantum information science / Quantum cryptography / Mathematical analysis / Cryptography / Quantum key distribution / Leftover hash lemma / Expected value / Mathematics / Applied mathematics / Quantum mechanics / Orthogonal polynomials

1 Stronger Attacks on Causality-Based Key Agreement Benno Salwey and Stefan Wolf Faculty of Informatics, Universit`a della Svizzera Italiana, Via G. Buffi 13, 6900 Lugano, Switzerland

Add to Reading List

Source URL: cqi.inf.usi.ch

Language: English - Date: 2016-01-25 05:30:01
UPDATE