Hash

Results: 3740



#Item
971Priority queue / Fibonacci heap / D-ary heap / Binary heap / Hash table / Heap / Stack / Rounding / Computing / Abstract data types / Mathematics / Search algorithms

CAMP: A Cost Adaptive Multi-Queue Eviction Policy for Key-Value Stores ∗† Shahram Ghandeharizadeh, Sandy Irani, Jenny Lam, Jason Yap, Hieu Nguyen Database Laboratory Technical ReportComputer Science Departme

Add to Reading List

Source URL: dblab.usc.edu

Language: English - Date: 2015-05-20 15:59:56
972Sandwiches / Fast food / Meals / Full breakfast / Hash / Breakfast / Steak sandwich / French toast / Salad / Food and drink / Breakfast foods / British cuisine

LUNCH MENU SIGNATURE SANDWICHES STARTERS Nachos

Add to Reading List

Source URL: www.luxor.com

Language: English - Date: 2013-10-31 19:05:21
973Hash table / Phreaking / Human voice / Oral literature / Vocal music / Click consonant / Consonants / Here

Dynamicic.comHow to Rehash a List Dynamic Interactive

Add to Reading List

Source URL: www.dynamicic.com

Language: English - Date: 2013-03-14 18:29:45
974Information retrieval / Artificial intelligence / Hash table / Consistent hashing / Hash function / Extendible hashing / Cuckoo hashing / Hashing / Search algorithms / Information science

A Fast, Minimal Memory, Consistent Hash Algorithm    John Lamping, Eric Veach  Google    Abstract 

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-06-09 20:16:29
975Evaluation / Science / Cryptographic Module Validation Program / Cryptographic Module Testing Laboratory / Validation / Cryptography / Verification and validation / Cryptographic hash function / FIPS 140-3 / Cryptography standards / Computer security / FIPS 140-2

<4D6963726F736F667420576F7264202D204A434D2D30312088C38D86838283578385815B838B8E8E8CB18B7982D194468FD890A7937882CC8AEE967B8B4B92F62E646F63>

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:10
976Information retrieval / Information science / Universal hashing / Hash function / Hash table / Cryptographic hash function / Perfect hash function / Tabulation hashing / SUHA / Hashing / Search algorithms / Artificial intelligence

Algorithms Lecture 12: Hash Tables [Fa’13] Insanity is repeating the same mistakes and expecting different results. — Narcotics Anonymous (1981)

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-12-28 09:02:37
977File sharing networks / Cryptographic protocols / Secure communication / Cross-platform software / Kademlia / Peer-to-peer / Distributed hash table / Kad network / Transport Layer Security / Software / Computing / Distributed data storage

UNIVERSITY OF MANNHEIM Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia

Add to Reading List

Source URL: www.philippheckel.com

Language: English - Date: 2009-11-25 08:49:15
978NESSIE / SOBER / Nimbus / LEVIATHAN / Hierocrypt / Grand Cru / SAFER / Cryptographic hash function / NOEKEON / Cryptography / Block ciphers / Stream ciphers

Project Number ISTProject Title

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-10-21 08:30:46
979Concurrent computing / Cross-platform software / Freenet / Peer-to-peer / Routing / Chord / Overlay network / Distributed hash table / Anonymous P2P / Software / Computing / Distributed data storage

Lecture 26: Small-World Peer-to-Peer Networks and Their Security Issues Lecture Notes on “Computer and Network Security” by Avi Kak () April 16, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-16 15:23:41
980MD5 / Search algorithms / Collision attack / Hash function / Padding / SHA-1 / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-29 17:14:50
UPDATE