Hashing

Results: 1317



#Item
61Phasing: Private Set Intersection using Permutation-based Hashing (Full Version)∗ Benny Pinkas Bar-Ilan University, Israel

Phasing: Private Set Intersection using Permutation-based Hashing (Full Version)∗ Benny Pinkas Bar-Ilan University, Israel

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-07-27 04:51:05
    62princeton univ. F’14  cos 521: Advanced Algorithm Design Lecture 1: Course Intro and Hashing Lecturer: Sanjeev Arora

    princeton univ. F’14 cos 521: Advanced Algorithm Design Lecture 1: Course Intro and Hashing Lecturer: Sanjeev Arora

    Add to Reading List

    Source URL: www.cs.princeton.edu

    - Date: 2014-09-17 11:30:55
      63History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡  Udi Wieder§

      History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2008-08-18 02:50:19
        64Scalable GPU-accelerated IPv6 Lookup using Hierarchical Perfect Hashing Shijie Zhou Viktor K. Prasanna

        Scalable GPU-accelerated IPv6 Lookup using Hierarchical Perfect Hashing Shijie Zhou Viktor K. Prasanna

        Add to Reading List

        Source URL: ganges.usc.edu

        - Date: 2016-01-27 14:43:11
          65Semantic Hashing Ruslan Salakhutdinov Geoffrey Hinton  Department of Computer Science

          Semantic Hashing Ruslan Salakhutdinov Geoffrey Hinton Department of Computer Science

          Add to Reading List

          Source URL: www.cs.toronto.edu

          - Date: 2009-09-11 22:42:22
            66Decoupling the Ethernet from Hash Tables in Consistent Hashing Ike Antkare International Institute of Technology United Slates of Earth

            Decoupling the Ethernet from Hash Tables in Consistent Hashing Ike Antkare International Institute of Technology United Slates of Earth

            Add to Reading List

            Source URL: membres-lig.imag.fr

            - Date: 2014-01-09 04:24:29
              67A Methodology for the Deployment of Consistent Hashing Ike Antkare International Institute of Technology United Slates of Earth

              A Methodology for the Deployment of Consistent Hashing Ike Antkare International Institute of Technology United Slates of Earth

              Add to Reading List

              Source URL: membres-lig.imag.fr

              - Date: 2014-01-09 04:24:28
                68Beyond	
  	
   Locality	
  Sensitive	
  Hashing	
   Alex	
  Andoni	
  	
   (Microsoft	
  Research)	
   Joint	
  with:	
  Piotr	
  Indyk	
  (MIT),	
  Huy	
  L.	
  Nguyen	
  (Princeton),	
  Ilya	
   Raz

                Beyond     Locality  Sensitive  Hashing   Alex  Andoni     (Microsoft  Research)   Joint  with:  Piotr  Indyk  (MIT),  Huy  L.  Nguyen  (Princeton),  Ilya   Raz

                Add to Reading List

                Source URL: mmds-data.org

                - Date: 2014-07-08 21:55:14
                  69Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys Phillip Rogaway Department of Computer Science, University of California, Davis, California 95616, USA, and Department of Computer Science, Facult

                  Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys Phillip Rogaway Department of Computer Science, University of California, Davis, California 95616, USA, and Department of Computer Science, Facult

                  Add to Reading List

                  Source URL: web.cs.ucdavis.edu

                  - Date: 2007-02-01 00:14:59
                    70CS168: The Modern Algorithmic Toolbox Lecture #1: Introduction and Consistent Hashing Tim Roughgarden & Gregory Valiant∗ March 28,

                    CS168: The Modern Algorithmic Toolbox Lecture #1: Introduction and Consistent Hashing Tim Roughgarden & Gregory Valiant∗ March 28,

                    Add to Reading List

                    Source URL: theory.stanford.edu

                    - Date: 2016-06-04 09:49:43