Hash

Results: 3740



#Item
171Information science / Information retrieval / Search algorithms / Hashing / Cuckoo hashing / Hash table / Perfect hash function / Hash function / Linear probing / Randomized algorithm / Big O notation / Double hashing

Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation Yuriy Arbitman∗ Moni Naor†

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2010-04-08 04:06:04
172Distributed data storage / Computing / Computer programming / Graph theory / BATON Overlay / Tapestry / B-tree / Pastry / Distributed hash table / Chord / Tree / Binary tree

BATON: A Balanced Tree Structure for Peer-to-Peer Networks H.V. Jagadish 1,2

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2005-05-27 03:47:05
173Food and drink / World cuisine / Canadian cuisine / British cuisine / American cuisine / Cuisine of Northern Ireland / Breakfast / Scrambled eggs / Eggs Benedict / Pancake / Sausage / Gravy

BREAKFAST EGG SCRAMBLES OR OMELETS your choice between scrambled or omelet served with hash browns, “those potatoes” or fresh fruit & choice of toast

Add to Reading List

Source URL: www.shiloportlandrestaurant.com

Language: English - Date: 2016-07-11 16:59:54
174Computing / Computer programming / Software engineering / C++ Standard Library / Search algorithms / Data types / Arrays / Associative arrays / Trie / Hash table / Associative containers / HAT-trie

Microsoft Word - NLA-monographdoc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-06-14 11:42:44
175Cryptography / Cryptographic hash functions / One-way compression function / Block cipher / SHA-1 / Hash function

An abridged version, reference [2], appears as Advances in Cryptology – CRYPTO ’02, Lecture Notes in Computer Science, Vol. ????, M. Yung, ed., Springer-Verlag. This is the full version. Black-Box Analysis of the Blo

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-06-04 14:04:18
176Computing / Concurrent computing / Distributed data storage / File sharing / Distributed computing architecture / Network architecture / Distributed hash table / Distributed computing / Peer-to-peer / Overlay network / Grid computing / Pastry

Scalable Computing: Practice and Experience Volume 8, Number 3, pp. 229–239. http://www.scpe.org ISSNc 2007 SWPS

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2011-05-16 08:40:08
177

EWERTON RODRIGUES ANDRADE LYRA2: PASSWORD HASHING SCHEME WITH IMPROVED SECURITY AGAINST TIME-MEMORY TRADE-OFFS LYRA2: UM ESQUEMA DE HASH DE

Add to Reading List

Source URL: lyra2.net

Language: Portuguese - Date: 2016-07-22 14:26:58
    178Distributed data storage / Computing / Concurrent computing / Distributed computing / Kademlia / Distributed hash table / Kad network / Pastry / Tapestry / Chord / Peer-to-peer / Routing

    Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim University of Minnesota - Twin Cities 200 Union Street SE Minneapolis, MN 55455

    Add to Reading List

    Source URL: www.cs.okstate.edu

    Language: English - Date: 2011-08-15 19:32:40
    179File sharing networks / File sharing / Distributed data storage / Computing / Peer-to-peer / Gnutella / Chord / Digital audio / Digital rights / Privacy in file sharing networks / Distributed hash table

    Answering Similarity Queries in Peer-to-Peer Networks ? Panos Kalnis ∗ Wee Siong Ng Beng Chin Ooi Kian-Lee Tan Department of Computer Science National University of Singapore 3 Science Drive 2, Singapore

    Add to Reading List

    Source URL: www.comp.nus.edu.sg

    Language: English - Date: 2004-11-23 03:44:44
    UPDATE