Hashing

Results: 1317



#Item
91Information science / Information retrieval / Statistics / Hashing / Search algorithms / Error detection and correction / Vector calculus / MinHash / Polynomial kernel / Jaccard index / Support vector machine / Cosine similarity

The Power of Comparative Reasoning Jay Yagnik, Dennis Strelow, David A. Ross, Ruei-sung Lin {jyagnik, strelow, dross, rslin}@google.com Abstract beddings on multiple partial order statistics rather than total

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2011-08-08 17:37:32
92Search algorithms / Information science / Information retrieval / Mathematics / Nearest neighbor search / Locality-sensitive hashing / K-nearest neighbors algorithm / Hash function / Hash table / Curse of dimensionality / Similarity search

Selective Hashing: Closing the Gap between Radius Search and k-NN Search Jinyang Gao‡ H. V. Jagadish§

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2015-06-06 09:21:03
93Information science / Information retrieval / Search algorithms / Hashing / Computing / Trie / Hash table / Cuckoo hashing / Bloom filter / Hash function / Perfect hash function / Database index

SILT: A Memory-Efficient, High-Performance Key-Value Store

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2011-09-20 03:36:42
94Algebra / Mathematics / Computing / Search algorithms / Data types / Vectors / Hashing / Error detection and correction / Hash function / Association list / Abstract data type / Hash table

Microsoft PowerPoint - Lect12advanced_data.ppt

Add to Reading List

Source URL: sicp.csail.mit.edu

Language: English - Date: 2005-10-17 09:39:31
95Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
96Mathematics / Algebra / Polynomials / Mathematical analysis / Splitting field / Finite field / Irreducible polynomial / Factorization / Elliptic curve / Algebraic function / Discriminant / Resolvent cubic

On Hashing into Elliptic Curves Reza Rezaeian Farashahi Department of Computing, Macquarie University Sydney, NSW 2109, Australia Igor E. Shparlinski

Add to Reading List

Source URL: www.ma.utexas.edu

Language: English - Date: 2009-09-22 11:55:18
97Statistics / Search algorithms / Information science / Information / Dimension reduction / K-d tree / K-means clustering / Normal distribution / K-nearest neighbors algorithm / Principal component analysis / Locality-sensitive hashing / Nearest neighbor search

LARGE-SCALE MUSIC SIMILARITY SEARCH WITH SPATIAL TREES Brian McFee Computer Science and Engineering University of California, San Diego ABSTRACT

Add to Reading List

Source URL: eceweb.ucsd.edu

Language: English - Date: 2015-07-31 19:00:26
98Search algorithms / Information science / Statistical classification / Information retrieval / Learning / Machine learning / Dimension reduction / Hashing / K-nearest neighbors algorithm / Support vector machine / Jeffrey Ullman / Locality-sensitive hashing

Note to other teachers and users of these slides: We would be delighted if you found this our material useful in giving your own lectures. Feel free to use these slides verbatim, or to modify them to fit your own needs.

Add to Reading List

Source URL: mmds.org

Language: English - Date: 2014-08-11 14:11:58
99Cryptography / Message authentication codes / Cryptographic hash functions / Block cipher / PMAC / Universal hashing / Permutation

Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-02-15 21:53:00
100Exonumia / Military personnel / Chivalry / Ambient intelligence / Dwight D. Eisenhower / Ike / Actor model

A Methodology for the Deployment of Consistent Hashing Ike Antkare International Institute of Technology United Slates of Earth

Add to Reading List

Source URL: membres-lig.imag.fr

Language: English - Date: 2014-01-09 04:24:29
UPDATE