<--- Back to Details
First PageDocument Content
Search algorithms / Error detection and correction / Message authentication codes / Artificial intelligence / Information retrieval / Hash function / Universal hashing / UMAC / MMH-Badger MAC / Hashing / Cryptographic hash functions / Cryptography
Date: 2008-11-24 08:44:36
Search algorithms
Error detection and correction
Message authentication codes
Artificial intelligence
Information retrieval
Hash function
Universal hashing
UMAC
MMH-Badger MAC
Hashing
Cryptographic hash functions
Cryptography

Add to Reading List

Source URL: www.erikzenner.name

Download Document from Source Website

File Size: 301,48 KB

Share Document on Facebook

Similar Documents

Cryptocurrencies / Economy / Money / Finance / Blockchains / Alternative currencies / Decentralization / Bitcoin / Counterparty / Ethereum

PROJECT PAI TECHNICAL WHITEPAPER SUMMARY PAI BLOCKCHAIN PROTOCOL: A DECENTRALIZED ARTIFICIAL INTELLIGENCE NETWORK

DocID: 1xVWW - View Document

Computing / Computer hardware / Technology / NVDIMM / Non-volatile random-access memory / Intel / Dynamic random-access memory / Processor

Persistent Memory for Artificial Intelligence Bill Gervasi Principal Systems Architect Santa Clara, CA

DocID: 1xVOm - View Document

Artificial neural network / Computational neuroscience / Market research / Market segmentation / Mathematical psychology / Applied mathematics

Journal of Machine Learning Research, 4th International Conference on Predictive Applications and APIs Marvin - Open source artificial intelligence platform Lucas B. Miguel

DocID: 1xVLb - View Document

Cyberwarfare / Security engineering / Computing / Computer network security / Emerging technologies / Computer security / National security / Internet of things / Cyber threat intelligence / Big data / Threat / Artificial intelligence

Cybersecurity Powered by Artificial Intelligence and the Blockchain HEROIC.com Team February 2018

DocID: 1xVHi - View Document