N-Hash

Results: 65



#Item
21

23 Euforiserende stoffer n Euforiserende stoffer omfatter her hash og en række andre psykoaktive stoffer med stimulerende, sløvende

Add to Reading List

Source URL: www.si-folkesundhed.dk

Language: Danish - Date: 2008-02-06 08:14:26
    22Computing / Forwarding information base / Routing table / Peer-to-peer / Forwarding plane / Distributed hash table / Routing / Network architecture / Internet

    Route discovery and caching: a way to improve the scalability of Information-Centric Networking N. Blefari Melazzi, A. Detti, M. Pomposini, S. Salsano Department of Electronic Engineering University of Rome, Tor Vergata,

    Add to Reading List

    Source URL: netgroup.uniroma2.it

    Language: English - Date: 2012-07-23 16:01:37
    23Cuisine of the Southwestern United States / Galician cuisine / Mexican cuisine / New Mexican cuisine / Omelette / Sausage / Food and drink / Breakfast foods / Chorizo

    T H E B R E A K FA S T M E N U EGGS All egg dishes come with a side of crispy hash-browns, your choice of multigrain, rye or sourdough toast & a piece of fresh fruit. Substitute for free–range for 50 cents / egg. Subs

    Add to Reading List

    Source URL: tangentcafe.ca

    Language: English - Date: 2014-03-06 01:15:16
    24File sharing / Tor / Comparison of BitTorrent clients / Magnet URI scheme / Peer exchange / Peer-to-peer / The Pirate Bay / Distributed hash table / Anonymous P2P / BitTorrent / Software / Computing

    One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users Stevens Le Blond Pere Manils Abdelberi Chaabane Mohamed Ali Kaafar Claude Castelluccia Arnaud Legout Walid Dabbous I.N.R.I.A, Fra

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2011-03-08 10:07:59
    25Preimage attack / MD5 / SHA-2 / Hash function / SHA-1 / Hash table / Collision attack / Padding / Tiger / Cryptographic hash functions / Cryptography / Error detection and correction

    Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology,

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:30
    26Search algorithms / Coding theory / Information theory / Mathematics / Information retrieval / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

    On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution Maxwell N. Krohn Michael J. Freedman

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2004-02-29 16:05:25
    27Information retrieval / Locality-sensitive hashing / Hash function / Point location / N-sphere / Approximation algorithm / Nearest neighbor search / Search algorithms / Information science / Artificial intelligence

    Optimal Data-Dependent Hashing for Approximate Near Neighbors Alexandr Andoni∗ † Ilya Razenshteyn∗ ‡ March 18, 2015

    Add to Reading List

    Source URL: www.ilyaraz.org

    Language: English - Date: 2015-03-18 00:06:14
    28Duck confit / Sauce / Salad / Breakfast / Food and drink / Top Chef / Eggs Benedict

    B R U N C H B R E A K F A S T A P P E T I Z E R S E G G S- served with potato hash and fresh fruit

    Add to Reading List

    Source URL: waterfrontkitchen.com

    Language: English - Date: 2015-02-28 14:19:36
    29Distributed computing / Chord / Distributed hash table / Peer-to-peer / Node / Scalability / Consistent hashing / Shared nothing architecture / Routing / Distributed data storage / Computing / Concurrent computing

    Scaling a Highly-Available DBMS beyond a Dozen Nodes Svein Erik Bratsberg Department of Computer and Information Science Norwegian Universitity of Science and Technology N-7491 Trondheim, Norway

    Add to Reading List

    Source URL: www.nik.no

    Language: English - Date: 2004-12-12 14:17:11
    30MD4 / SHA-2 / SHA-1 / RIPEMD / MD5 / Hash function / Keccak / MD2 / Crypt / Error detection and correction / Cryptographic hash functions / Cryptography

    CA642: C RYPTOGRAPHY AND N UMBER T HEORY 8 1

    Add to Reading List

    Source URL: www.computing.dcu.ie

    Language: English - Date: 2014-10-30 10:52:49
    UPDATE