Hashing

Results: 1317



#Item
701Search algorithms / Random oracle / Preimage attack / MDC-2 / Hash function / Block cipher modes of operation / Birthday attack / Collision attack / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
702Information retrieval / Hash function / Locality-sensitive hashing / K-nearest neighbor algorithm / Nearest neighbor search / Hash table / Cryptographic hash function / Machine learning / Search algorithms / Information science / Artificial intelligence

In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June[removed]Fast Image Search for Learned Metrics Prateek Jain Brian Kulis Kristen Grauman Department of Computer Sciences Universi

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2008-08-10 18:06:43
703Trusted computing / Cryptography / Hashing / Monolithic kernels / Next-Generation Secure Computing Base / Trusted Platform Module / Procfs / Kernel / Hash table / Computer architecture / Computing / Computer security

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

Add to Reading List

Source URL: sigops.org

Language: English - Date: 2011-09-20 03:37:00
704Cryptographic hash functions / HMAC / SHA-1 / MD5 / Collision attack / Hash function / MD4 / Collision resistance / SHA-2 / Error detection and correction / Cryptography / Hashing

Journal of Universal Computer Science, vol. 14, no[removed]), [removed]submitted: 2/6/07, accepted: [removed], appeared: 1/2/08 © J.UCS New Results on NMAC/HMAC when Instantiated with Popular Hash Functions Christian Rechb

Add to Reading List

Source URL: www.jucs.org

Language: English - Date: 2008-09-17 07:43:00
705Artificial intelligence / Shape context / Object recognition / Segmentation / Active shape model / Shape / Geometric hashing / Object detection / Deformation / Computer vision / Vision / Imaging

. INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE From images to shape models for object detection Vittorio Ferrari — Frederic Jurie — Cordelia Schmid

Add to Reading List

Source URL: eprints.pascal-network.org

Language: English - Date: 2009-03-16 09:40:05
706Hashing / Quadratic probing / Software engineering / Associative arrays / Hash table / Sequence container / Hash function / Set / Lookup table / Computing / Search algorithms / Computer programming

Microsoft Word - Hash.h.docx

Add to Reading List

Source URL: digital.cs.usu.edu

Language: English - Date: 2010-10-05 14:53:24
707File sharing networks / Bloom filter / Hashing / Peer-to-peer / Communications protocol / World Wide Web / X Window System / Computing / Software / Data

FAIR: Fair Audience InfeRence Rob Johnson∗ University of California at Berkeley [removed] Jessica Staddon

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-11-12 04:59:54
708Information retrieval / Artificial intelligence / Hash table / Hash function / Heap / Big O notation / Linear probing / Search algorithms / Hashing / Information science

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Srini Devadas and Erik Demaine March 7, 2008 Handout 6

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2008-03-07 01:43:43
709Information science / Artificial intelligence / Linear probing / Universal hashing / Hash function / Hash table / K-independent hashing / Cryptographic hash function / Tabulation hashing / Search algorithms / Hashing / Information retrieval

out/LINPB-rand.lhug-7.Time.sorted.eps

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2009-12-20 15:49:04
710Computer storage / Data synchronization / Replication / Database / File system / Hash function / Computer data storage / Computer cluster / WebDFS / Computing / Fault-tolerant computer systems / Search algorithms

Replication Under Scalable Hashing: A Family of Algorithms for Scalable Decentralized Data Distribution R. J. Honicky [removed] Ethan L. Miller

Add to Reading List

Source URL: www.ssrc.ucsc.edu

Language: English - Date: 2014-02-12 18:01:49
UPDATE