Hashing

Results: 1317



#Item
431File sharing networks / Hashing / Peer-to-peer / Distributed hash table / Computing / Cryptography / Cryptographic hash function / Routing / Science / Distributed data storage / Reputation management / Sybil attack

Christopher T Lesniewski-Laas Updated March 2010 Contact Information

Add to Reading List

Source URL: lesniewski.org

Language: English - Date: 2010-03-13 22:43:23
432Cryptography / Hashing / SHA-2 / Internet standards / SHA-1 / HMAC / MD5 / Base64 / Perl / Error detection and correction / Computing / Cryptographic hash functions

Perl versiondocumentation - Digest::SHA NAME Digest::SHA - Perl extension for SHA512 SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 16:10:43
433Applied mathematics / Hashing / Suffix tree / Hash function / Hash table / Vertex cover / Bloom filter / Universal hashing / Time complexity / Theoretical computer science / Search algorithms / Computational complexity theory

Guide to Examinable Material COMS31900 – Advanced AlgorithmsDecember 2013 Overview This guide is organised topic by topic in the same order that the course was taught. References into the lectures are giv

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:17
434USENIX / Hashing / Information technology management / Computing / Software / Search algorithms / Error detection and correction / Hash function

Efficient  MRC  Construc0on   with  SHARDS   Carl  Waldspurger          Nohhyun  Park   Alexander  Garthwaite          Irfan  Ahmad   CloudPhysics,  Inc.

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-02-18 17:36:12
435Information retrieval / Information science / Universal hashing / Hash function / Hash table / Cryptographic hash function / Tabulation hashing / SUHA / Search algorithms / Hashing / Artificial intelligence

Dictionaries Advanced Algorithms – COMS31900  In a dictionary data structure we store (key, value)-pairs such that for any key there is at most one pair (key, value) in the dictionary.  Often we want to perform the f

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
436Information science / Artificial intelligence / Hash table / Cuckoo hashing / Universal hashing / Hash function / Dynamic perfect hashing / Double hashing / Perfect hash function / Search algorithms / Hashing / Information retrieval

Previously on COMS31900. . . Advanced Algorithms – COMS31900 Hashing with chaining Instead of a linked list, throw colliding

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
437Information science / Artificial intelligence / Hash function / Universal hashing / Hash table / Perfect hash function / Cryptographic hash function / Linear probing / Tabulation hashing / Hashing / Search algorithms / Information retrieval

Dictionaries and Hashing recap  A dynamic dictionary stores (key, value)-pairs and supports: add(key, value), lookup(key) (which returns value) and delete(key) Advanced Algorithms – COMS31900

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
438Artificial intelligence / Approximation algorithms / Mathematics / Nearest neighbor search / Search algorithms / Dimension reduction / Locality-sensitive hashing

Microsoft PowerPoint - mmds

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2006-10-15 22:45:52
439Cross-platform software / Relational database management systems / Hashing / Search algorithms / Base64 / Constructor / Universally unique identifier / Database index / Hash function / Computing / Information science / Information

Parser2013 Art. Lebedev studio presents…

Add to Reading List

Source URL: www.parser.ru

Language: English - Date: 2013-11-01 07:48:47
440Block cipher / Function / MD5 / Hashing / GOST / Mathematics / Cryptographic hash functions / Feistel cipher

F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei Department of Science, National University of Defense Technology, Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-20 23:47:47
UPDATE