Hashing

Results: 1317



#Item
731Peer-to-peer computing / Concurrent computing / Transaction processing / Cryptographic hash functions / Error detection and correction / Hashing / Computing / Software / Bitcoin

Accelerating Bitcoin’s Transaction Processing Fast Money Grows on Trees, Not Chains Yonatan Sompolinsky∗ Aviv Zohar†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-31 04:08:51
732Technology / Error detection and correction / IOS / ITunes / Hashing / Md5sum / IPhone / IPad / Automated teller machine / Computing / Cryptographic hash functions / Apple Inc.

10 Tips of the Day John Hally[removed]Know who you are allowing to enter a secure building or area. It is polite to hold the door open for someone, but this circumvents the purpose of physical

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:53
733Search algorithms / Structured storage / Computer performance / Hashing / Hash table / Database index / IOPS / Hash function / Berkeley DB / Computing / Data management / Data

D:/Biplob/Research Ideas/VLDB2010/VLDB2010.dvi

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-11-14 22:26:16
734Hashing / Computing / Natural language processing / Speech recognition / Count-Min sketch / Information retrieval / Streaming algorithm / Bloom filter / Pointwise mutual information / Information science / Computational linguistics / Science

Sketching Techniques for Large Scale NLP Amit Goyal, Jagadeesh Jagarlamudi, Hal Daum´e III, and Suresh Venkatasubramanian University of Utah, School of Computing {amitg,jags,hal,suresh}@cs.utah.edu Abstract

Add to Reading List

Source URL: www.umiacs.umd.edu

Language: English - Date: 2011-01-07 13:11:25
735Data types / Hashing / Search algorithms / Error detection and correction / Hash function / Pointer / Cryptographic hash function / C / Array data type / Computing / Software engineering / Computer programming

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 14, A Simple Mechanism for Type Security Across Compilation Units MICHAEL L. SCOTT

Add to Reading List

Source URL: www.cs.rochester.edu

Language: English - Date: 2004-06-23 16:50:23
736Data types / Error detection and correction / Hashing / Procedural programming languages / Search algorithms / Hash function / C / Pascal / Forward declaration / Computing / Software engineering / Computer programming

A SIMPLE MECHANISM FOR TYPE SECURITY ACROSS COMPILATION UNITS by Michael L. Scott Raphael A. Finkel

Add to Reading List

Source URL: www.cs.rochester.edu

Language: English - Date: 2011-03-26 00:09:34
737Elliptic curves / Analytic number theory / Elliptic curve / Group theory / Oracle machine / Boneh/Franklin scheme / Supersingular elliptic curve / Prime number / Algebraic curve / Abstract algebra / Cryptography / Mathematics

Efficient Indifferentiable Hashing into Ordinary Elliptic Curves⋆ Eric Brier1 , Jean-S´ebastien Coron2 , Thomas Icart2⋆⋆ , David Madore3 , Hugues Randriam3 , and Mehdi Tibouchi2,4⋆ ⋆ ⋆ 1 Ingenico

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-03 09:18:30
738SHA-2 / Secure Shell / Password / Cryptographic hash function / Cryptographic software / Hash function / Crypt / Key / Cryptlib / Cryptography / Hashing / HMAC

Why is My App So Slow? (hint – it’s probably MySQL)

Add to Reading List

Source URL: doboard.com

Language: English - Date: 2009-04-24 14:18:17
739Search algorithms / Information retrieval / Computing / Cryptographic hash functions / Hash function / Hash join / Relational database / Trie / Join / Hashing / Data management / Error detection and correction

APPLYING HASH FILTERS TO IMPROVING EXECUTION OF BUSHY TREES

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 01:13:59
UPDATE