Hashing

Results: 1317



#Item
631Computing / Nearest neighbor search / K-d tree / R-tree / Vp-tree / M-tree / Locality-sensitive hashing / K-nearest neighbor algorithm / Honda P series / Information science / Mathematics / Search algorithms

Outline Branch and Bound Algorithms for Nearest Neighbor Search: Lecture 1 Yury Lifshits http://yury.name

Add to Reading List

Source URL: simsearch.yury.name

Language: English - Date: 2007-09-11 18:32:40
632Public-key cryptography / Internet protocols / Homomorphic encryption / Secret sharing / HMAC / Encryption / Cryptographic hash function / Wireless sensor network / Database / Cryptography / Cryptographic protocols / Hashing

Secure and Efficient In-Network Processing of Exact SUM Queries Stavros Papadopoulos 1 , Aggelos Kiayias 2 , Dimitris Papadias 3 1 Department of Computer Science and Engineering

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:45
633Information retrieval / Hashing / Error detection and correction / Hash functions / Dimension reduction / Locality-sensitive hashing / Jaccard index / Locality preserving hashing / Kullback–Leibler divergence / Search algorithms / Information science / Statistics

Similarity Estimation Techniques from Rounding Algorithms Moses S. Charikar Dept. of Computer Science Princeton University 35 Olden Street

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2004-02-04 10:27:32
634Search algorithms / Computing / Cryptography / Computer programming / Information retrieval / Hash function / Hash tree / SHA-1 / Bin / Hashing / Cryptographic hash functions / Error detection and correction

CADS: Continuous Authentication on Data Streams Stavros Papadopoulos Yin Yang Dimitris Papadias

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:50
635Cryptographic software / Cryptographic hash functions / X86 architecture / Hashing / Cryptography standards / OpenSSL / SHA-2 / AES instruction set / FIPS 140-2 / Cryptography / Computer architecture / Error detection and correction

ODT Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2014-11-25 17:47:07
636Cryptographic hash functions / Public-key cryptography / Secure communication / MD2 / MD4 / SHA-2 / SHA-1 / PKCS / X.509 / Cryptography / Cryptographic protocols / Hashing

Internet Engineering Task Force (IETF) Request for Comments: 6149 Obsoletes: 1319 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-03-07 21:32:56
637Information science / Artificial intelligence / Error detection and correction / Hash functions / Hash table / Cryptographic hash functions / Trie / Linked list / Perfect hash function / Hashing / Search algorithms / Information retrieval

VISUAL BASIC COLLECTIONS AND HASH TABLES Thomas Niemann Preface

Add to Reading List

Source URL: epaperpress.com

Language: English - Date: 2014-07-10 21:19:43
638Computing / Cryptographic hash functions / Hashing / SHA-2 / Internet protocols / HMAC / Bouncy Castle / SHA-1 / IPsec / Cryptography / Error detection and correction / Cryptographic software

Bouncy Castle FIPS Java API 1 Jan[removed]Introduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2015-03-02 04:20:28
639Mathematics / Nearest neighbor search / K-nearest neighbor algorithm / Locality-sensitive hashing / Ε-approximate nearest neighbor search / Nearest-neighbor chain algorithm / Information science / Search algorithms / Artificial intelligence

Comparing Nearest Neighbor Algorithms in High-Dimensional Space Hendra Gunadi College of Engineering and Computer Science Australian National University

Add to Reading List

Source URL: users.cecs.anu.edu.au

Language: English - Date: 2014-11-14 04:03:55
640Hashing / System software / Error detection and correction / Hash table / Hash function / Computer virus / Hash list / COM file / Ar / Computing / Search algorithms / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS MAKING A HASH OF THINGS Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 17:18:26
UPDATE