Hashing

Results: 1317



#Item
211Search algorithms / Hashing / Error detection and correction / Hash function / Hash table / Big O notation / Cryptographic hash function / CohenSutherland algorithm

Introduction to Algorithms Massachusetts Institute of Technology Professors Srini Devadas and Constantinos (Costis) Daskalakis March 11, Spring 2009

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2010-02-02 11:49:29
212

The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 Abstract

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-04-22 21:02:23
    213Hashing / Recommender system / Information science / Information retrieval / Countmin sketch / Internet privacy / Privacy / Computing

    Efficient Private Statistics with Succinct Sketches Luca Melis, George Danezis, and Emiliano De Cristofaro Department of Computer Science, University College London {luca.melis.14, g.danezis, e.decristofaro}@ucl.ac.uk Ab

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English
    214

    History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§

    Add to Reading List

    Source URL: pholia.tdi.informatik.uni-frankfurt.de

    Language: English - Date: 2016-02-23 03:12:01
      215

      Supervised Discrete Hashing Fumin Shen1 , Chunhua Shen2 , Wei Liu3 , Heng Tao Shen4 1 University 4 The of Electronic Science and Technology of China.

      Add to Reading List

      Source URL: www.cv-foundation.org

      Language: English - Date: 2015-05-24 11:41:14
        216Information science / Information retrieval / Hashing / Computing / Search algorithms / Signal processing filter / Bloom filter / Information-centric networking / Filter / Electronic filter / Hash function / Domain name

        Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline

        Add to Reading List

        Source URL: conferences2.sigcomm.org

        Language: English - Date: 2015-10-02 15:10:02
        217

        Locality-Sensitive Hashing Scheme Based on p-Stable Distributions Mayur Datar Department of Computer Science, Stanford University

        Add to Reading List

        Source URL: www.immorlica.com

        Language: English - Date: 2014-01-01 20:44:30
          218Computing / Data management / Data / Distributed data storage / NoSQL / Cloud storage / Dynamo / Distributed data store / Chord / Replication / Consistent hashing / Pastry

          Microsoft Word - sosp067-decandia1.doc

          Add to Reading List

          Source URL: css.csail.mit.edu

          Language: English - Date: 2014-12-08 14:33:01
          219Cryptographic hash functions / Cryptography / Hashing / Information retrieval / Error detection and correction / Applied mathematics / SHA-2 / Merkle tree / SHA-1 / Hash list / Baseball at the 2013 East Asian Games / Baseball at the 2007 Southeast Asian Games

          On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

          Add to Reading List

          Source URL: digitalpiglet.org

          Language: English - Date: 2009-11-27 08:30:51
          220

          Two-way Hashing with Separate Chaining and Linear Probing Ebrahim Malalla School of Computer Science McGill University, Montreal

          Add to Reading List

          Source URL: www.ccse.kfupm.edu.sa

          Language: English - Date: 2008-03-15 05:26:21
            UPDATE