Hashing

Results: 1317



#Item
121Search algorithms / Hashing / Selection algorithm / Hash function / Randomized algorithm / A* search algorithm / Cryptographic hash function

Distributed Computation of the Mode Fabian Kuhn Institute of Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:27
122Search algorithms / Hashing / Cuckoo hashing / Hash function / 2-choice hashing / Locality-sensitive hashing

Algorithms and Data Structures Winter TermExercises for Unit 11 s 1. For this question assume we have n buckets, B1 , . . . , Bn , initially empty, and an unlimited

Add to Reading List

Source URL: www-tcs.cs.uni-sb.de

Language: English - Date: 2016-03-07 07:14:38
123NP-complete problems / Graph theory / Graph / Subgraph isomorphism problem

RAM: Randomized Approximate Graph Mining Based on Hashing

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2008-07-13 12:41:38
124Abstract data types / Search algorithms / Hashing / Arrays / Hash table / Collection / Garbage collection / Sorting algorithm / Ruby / Algorithm / Hash function / Trie

Data Structures and Algorithms with Object-Oriented Design Patterns in Ruby Data Structures and Algorithms with Object-Oriented Design Patterns in Ruby

Add to Reading List

Source URL: www.brpreiss.com

Language: English - Date: 2014-07-08 21:38:40
125Error detection and correction / Hashing / Cryptographic hash functions / Search algorithms / Malware / Malware analysis / Computer virus / Antivirus software / Hash function / MD5 / Hash list / Crypt

Proceedings Template - WORD

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:52
126Search algorithms / Hashing / Functions and mappings / Topology / Dynamic perfect hashing / Function / Universal hashing / Hash table / Set / Hash function / Binary relation / Surjective function

Microsoft Word - NLA-monographdoc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-06-14 11:43:50
127NIST hash function competition / Cryptographic hash functions / SHA-3 / Hashing / Cryptography / Application-specific integrated circuit / Institute for Applied Information Processing and Communications / Crypt / Zorro

Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
128Coding theory / Error detection and correction / Expander code / Expander graph / Linear code / Hamming / Isoperimetric inequality / Connectivity / Clique / Forward error correction / Graph / Bipartite graph

CS168: The Modern Algorithmic Toolbox Lecture #19: Expander Codes Tim Roughgarden & Gregory Valiant∗ June 1, 2016 In the first lecture of CS168, we talked about modern techniques in data storage (consistent hashing). S

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2016-06-04 09:49:43
129Search algorithms / Feature detection / Hashing / Error detection and correction / Bloom filter / Hash function / Sobel operator / Peak signal-to-noise ratio / Prewitt operator / Memristor / Hash table

Resistive Bloom Filters: From Approximate Membership to Approximate Computing with Bounded Errors ∗ Department † Department

Add to Reading List

Source URL: mesl.ucsd.edu

Language: English - Date: 2015-12-02 16:27:13
130B-tree / Wireless sensor network / Distributed data storage / Hashing

Approximate Aggregation Techniques for Sensor Databases Je rey Considine, Feifei Li, George Kollios, and John Byers Computer Science Dept., Boston University fjconsidi, lifeifei, gkollios, Abstract

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2003-12-19 20:40:17
UPDATE