Hashing

Results: 1317



#Item
381Geometry / Locality-sensitive hashing / Hash function / Hash table / Hamming distance / Nearest neighbor search / Search algorithms / Information science / Information retrieval

The Power of Asymmetry in Binary Hashing Behnam Neyshabur Payman Yadollahpour Yury Makarychev Toyota Technological Institute at Chicago

Add to Reading List

Source URL: papers.nips.cc

Language: English - Date: 2014-11-26 14:29:25
382Bloom filter / Hashing / N1 road

RESOURCE-EFFICIENT MISBEHAVIOR IDENTIFICATION IN WIRELESS AD HOC NETWORKS by William David Kozma Jr A Thesis Submitted to the Faculty of the

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2009-05-09 02:32:54
383Computing / Cryptographic hash function / Information / Hash tree / Transmission Control Protocol / Data / Hash function / IP traceback / Error detection and correction / Hashing / Cryptography

Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks∗ Sangwon Hyun, Peng Ning, An Liu North Carolina State University Abstract

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:10
384Information science / Artificial intelligence / Hash function / Perfect hash function / Hash table / Cryptographic hash function / Trie / Universal hashing / Tabulation hashing / Search algorithms / Hashing / Information retrieval

COMPUTNVG PRACTICES Using only a few simple and commonplace instructions, this algorithm efficiently maps variable-length text strings on to small integers.

Add to Reading List

Source URL: epaperpress.com

Language: English - Date: 2011-12-28 10:41:56
385Computer architecture / Remote direct memory access / Dynamic random-access memory / Computer data storage / CPU cache / Cache / Random-access memory / Lustre / Memory bandwidth / Computer memory / Computing / Computer hardware

Algorithmic Improvements for Fast Concurrent Cuckoo Hashing

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2014-10-22 17:34:26
386HMAC / Transmission Control Protocol / SCADA / Public-key cryptography / Block cipher modes of operation / Key / Cipher / Cryptography / Message authentication codes / Hashing

Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-08-15 15:03:54
387Hashing / Message authentication codes / Search algorithms / Cryptographic hash function / Public-key cryptography / Random number generation / PUF / Hash function / One-way function / Cryptography / Randomness / Physical Unclonable Function

Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips Research

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-13 19:26:58
388Information retrieval / Artificial intelligence / Hash table / Hash function / Garbage collection / Cryptographic hash function / Double hashing / Hash / Associative array / Hashing / Search algorithms / Information science

Generation-Friendly Eq Hash Tables Abdulaziz Ghuloum and R. Kent Dybvig Department of Computer Science, Indiana University, Bloomington, IN 47408 {aghuloum,dyb}@cs.indiana.edu Abstract

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2012-08-10 19:21:06
389Computer hardware / Computer storage media / Computing / Hashing / Cryptography / Hash table / Hash function / SHA-2 / SHA-1 / Search algorithms / Cryptographic hash functions / Information science

doi:j.diin

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-03 22:33:04
390Hash function / Hash table / Information science / Artificial intelligence / Information retrieval / Stack / Logarithm / Search algorithms / Error detection and correction / Hashing

1 The Tiled Bitmap Forensic Analysis Algorithm Kyriacos E. Pavlou and Richard T. Snodgrass, Senior Member, IEEE Abstract— Tampering of a database can be detected

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2009-04-24 16:55:29
UPDATE