Hash

Results: 3740



#Item
661

Pass-the-Hash and other credential theft and reuse techniques ELAPSED TIME: 48 HRS OR LESS

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2014-09-04 16:02:00
    662

    Breakfast – May 26th Eggs Made to Order Buttermilk Pancakes Orange Baguette French Toast Hash Browned Potatoes Turkey Linked Sausage

    Add to Reading List

    Source URL: umw.sodexomyway.com

      663Public-key cryptography / Elliptic Curve DSA / Hash function / Key / Wallet / Cryptographic nonce / SHA-2 / Cryptography / Bitcoin / Peer-to-peer computing

      Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.

      Add to Reading List

      Source URL: www.cs.technion.ac.il

      Language: English - Date: 2014-05-26 22:22:44
      664Gâteau Basque / Pastry / Pea soup / Crème anglaise / Bacon ice cream / Hash / Salad / Food and drink / Top Chef / Basque cuisine

      Microsoft Word - BBNY Brunch Menus

      Add to Reading List

      Source URL: www.barboulud.com

      Language: English - Date: 2015-06-12 13:26:54
      665Search algorithms / Molecular biology / DNA sequencing / Velvet assembler / Sequence assembly / Parallel computing / Hash table / Hash function / Shotgun sequencing / Biology / Bioinformatics / Genetics

      Parallelization of Velvet,“a de novo genome sequence assembler” Nitin Joshi§†∗ , Shashank Shekhar Srivastava§†∗ , M. Milner Kumar† , Jojumon Kavalan† , Shrirang K. Karandikar† and Arundhati Saraph†

      Add to Reading List

      Source URL: www.hipc.org

      Language: English - Date: 2011-11-11 12:59:10
      666Computer science / Linked list / Hash table / Stack / Streaming algorithm / Heap / Network congestion / Cuckoo hashing / Time complexity / Search algorithms / Theoretical computer science / Applied mathematics

      A Heaviest Hitters Limiting Mechanism with O(1) Time Complexity for Sliding-Window Data Streams 117 A Heaviest Hitters Limiting Mechanism with O(1) Time Complexity for Sliding-Window Data Streams

      Add to Reading List

      Source URL: utopia.duth.gr

      Language: English
      667Software / Tapestry / Chord / Routing / Pastry / Freenet / Tulip Overlay / Distributed hash table / Distributed data storage / Computing / Concurrent computing

      Theory Comput. Systems OF1–OF36DOI: s00224Theory of Computing Systems

      Add to Reading List

      Source URL: oceanstore.cs.berkeley.edu

      Language: English - Date: 2004-08-03 18:36:19
      668Tapestry / File sharing / Distributed hash table / Globally unique identifier / Peer-to-peer / Routing / Decentralized object location and routing / ANts P2P / Tulip Overlay / Distributed data storage / Computing / Concurrent computing

      Appears in Proc. of ACM/IFIP/USENIX Intl. Middleware Conf. (MiddlewareApproximate Object Location and Spam Filtering on Peer-to-peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, and J

      Add to Reading List

      Source URL: oceanstore.cs.berkeley.edu

      Language: English - Date: 2003-03-14 22:52:22
      669Software / Tapestry / Distributed hash table / Chord / Routing / Pastry / Network topology / Tree traversal / Tree / Distributed data storage / Computing / Concurrent computing

      Distributed Object Location in a Dynamic Network Kirsten Hildrum, John D. Kubiatowicz, Satish Rao and Ben Y. Zhao Computer Science Division, University of California at Berkeley hildrum, kubitron, satishr, ravenben@cs

      Add to Reading List

      Source URL: oceanstore.cs.berkeley.edu

      Language: English - Date: 2002-07-26 16:46:48
      670Information science / Information retrieval / Hash function / Hash table / Cryptographic hash function / Lookup table / Database / Search algorithms / Hashing / Computing

      Large Scale Machine Learning

      Add to Reading List

      Source URL: www.sanjivk.com

      Language: English - Date: 2010-10-12 11:05:04
      UPDATE