Hashing

Results: 1317



#Item
81Chivalry / Military personnel / Actor model / Concurrent computing / Dwight D. Eisenhower / Ike / Stan

Decoupling the Ethernet from Hash Tables in Consistent Hashing Ike Antkare International Institute of Technology United Slates of Earth

Add to Reading List

Source URL: membres-lig.imag.fr

Language: English - Date: 2014-01-09 04:24:28
82Search algorithms / Information science / Information retrieval / Hashing / Error detection and correction / Hash function / Hash table / BLAST / Locality-sensitive hashing / Bloom filter

CSE 584A Class 24 Jeremy Buhler April 20, 2016 1

Add to Reading List

Source URL: classes.engineering.wustl.edu

Language: English - Date: 2016-04-22 15:32:46
83Computing / Data management / Data / Query languages / Bloom filter / Hashing / XPath / Bin / XQuery / Database index / XML tree / Query optimization

A Clustered Index Approach to Distributed XPath Processing Georgia Koloniari and Evaggelia Pitoura Computer Science Department, University of Ioannina, Greece {kgeorgia,pitoura}@cs.uoi.gr

Add to Reading List

Source URL: dmod.eu

Language: English - Date: 2013-11-27 13:39:27
84Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

The Politics of Cryptography: Bitcoin and The Ordering Machines

Add to Reading List

Source URL: www.iqdupont.com

Language: English - Date: 2015-12-03 10:50:31
85Information retrieval / Information science / Hashing / Search algorithms / Universal hashing / Hash table / Linear probing / Hash function / Bloom filter / Cuckoo hashing / Randomness extractor / Cryptographic hash function

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard University

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2007-11-16 13:42:30
86Computing / Data management / Data / Distributed data storage / NoSQL / Cloud storage / Dynamo / Distributed data store / Chord / Replication / Consistent hashing / Pastry

Microsoft Word - sosp067-decandia1.doc

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2016-08-23 12:57:43
87Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
88Mathematics / Search algorithms / Information retrieval / Information science / Hashing / Analysis of algorithms / Cryptographic hash functions / Computational complexity theory / Universal hashing / Hash function / Randomized algorithm / Subset sum problem

Space-Efficient Randomized Algorithms for K-SUM Joshua R. Wang Stanford University, Stanford CA 94305, USA

Add to Reading List

Source URL: web.stanford.edu

Language: English - Date: 2014-04-18 04:16:48
89Information retrieval / Hashing / Information science / Search algorithms / Universal hashing / Hash table / Hash function / Linear probing / Cuckoo hashing / Bloom filter / Cryptographic hash function / Randomness extractor

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream

Add to Reading List

Source URL: theoryofcomputing.org

Language: English - Date: 2014-11-14 13:01:16
90Information science / Information retrieval / Search algorithms / Hashing / Information / MinHash / Hash table / Hash function / Association rule learning / Pearson product-moment correlation coefficient / Apriori algorithm / Bloom filter

Finding Highly Correlated Pairs Efficiently with Powerful Pruning ∗ Joan Feigenbaum

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2006-08-31 13:51:39
UPDATE