Hash

Results: 3740



#Item
811NHS primary care trust / SHA-2 / SHA-1 / Department of Health / Office of Public Sector Information / Health / Medicine / Government / Cryptographic hash functions / National Health Service / NHS strategic health authority

Integrated Services for People with Long-term Neurological Conditions: Evaluation of the Impact of the National Service Framework:  Appendices ProjectSylvia Bernard, Fiona Aspinal, Kate Gridley, Gillian Par

Add to Reading List

Source URL: www.york.ac.uk

Language: English - Date: 2010-09-28 05:08:23
812Information technology management / Cryptographic protocols / Cryptographic hash functions / EDIFACT / X.509 / Crypt / Public key certificate / SHA-2 / Checksum / Cryptography / Electronic commerce / Public-key cryptography

SCTS-SC Appendix C Codelists Version

Add to Reading List

Source URL: www.tullverket.se

Language: English - Date: 2013-06-12 06:23:19
813Internet standards / Computer architecture / Packet Processing / Transmission Control Protocol / Latency / Differentiated services / Emulator / Packet loss / Hash table / Computing / Network architecture / Network emulation

NIST Net – A Linux-based Network Emulation Tool Mark Carson, Darrin Santay National Institute of Standards and Technology (NIST) , Abstract

Add to Reading List

Source URL: snad.ncsl.nist.gov

Language: English - Date: 2009-08-18 20:43:43
814Search algorithms / Ciphertext indistinguishability / Random oracle / Advantage / Hash function / ElGamal encryption / One-way function / Optimal asymmetric encryption padding / Probabilistic encryption / Cryptography / Cryptographic hash functions / Hashing

CS276 Cryptography Spring 2006 Lecture 19: Lecturer: David Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
815Computing / Symbol / Ruby / String / Hash / Software engineering / Formal languages / Computer programming

💀 Symbols Erik Michaels-Ober (@sferik) RUG::B, 7 May 2015 Symbols are Useless 💩 1. Calling Symbol#to_s on every symbol in your

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2015-05-06 08:24:47
816Theoretical computer science / Search algorithms / Analysis of algorithms / Binary search tree / Merge sort / Algorithm / Insertion sort / Hash table / Time complexity / Mathematics / Order theory / Sorting algorithms

technische universiteit eindhoven 2IL05 Data Structures Exam

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2013-04-13 05:28:53
817Hash / Fried egg / Breakfast / Omelette / Corned beef / French toast / Bacon / Full breakfast / Diner lingo / Food and drink / Breakfast foods / Eggs Benedict

Breakfast THE GIMME 9.5 Two Eggs, House Cured Bacon, Choice of Hash Browns or Roasted Potatoes, Choice of Toast ZOLLER SCRAMBLE 11 Vegetables, Ham, Jack Cheese, Hot Sauce, Paprika Potatoes, Toast

Add to Reading List

Source URL: poppyhillsgolf.com

Language: English - Date: 2015-04-07 10:34:57
818Internet / Cryptographic protocols / Public-key cryptography / Internet standards / HTTP / Network Time Protocol / Cryptographic hash function / HTTP cookie / X.509 / Cryptography / Computing / Internet protocols

Microsoft PowerPoint - secproto.ppt

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2005-10-31 14:46:23
819Computing / Binary trees / Abstract data types / Binary search tree / Binary heap / Priority queue / Insertion sort / Hash table / Heapsort / Graph theory / Mathematics / Sorting algorithms

Exam, June 6, 2011 Jesper Larsson, ITU Instructions What to bring. You can bring any written aid you want. This includes the course book and a dictionary. In fact, these two things are the only aids that make sense, so I

Add to Reading List

Source URL: itu.dk

Language: English - Date: 2011-11-09 08:00:40
820Mathematics / Locality-sensitive hashing / Nearest neighbor search / Hash function / Speech recognition / Hash table / K-nearest neighbor algorithm / K-d tree / Information retrieval / Search algorithms / Information science / Artificial intelligence

LARGE-SCALE SPEAKER IDENTIFICATION Ludwig Schmidt∗ Matthew Sharifi and Ignacio Lopez Moreno MIT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-05-25 21:19:32
UPDATE