Tabulation hashing

Results: 36



#Item
1Nordic Collegiate Programming Contest NCPC 2007 October 6th, 2007 The Problemset A B

Nordic Collegiate Programming Contest NCPC 2007 October 6th, 2007 The Problemset A B

Add to Reading List

Source URL: ncpc.idi.ntnu.no

Language: English - Date: 2014-01-20 12:10:57
2Compressive sensing using locality-preserving matrices Elyot Grant∗ Piotr Indyk∗  December 4, 2012

Compressive sensing using locality-preserving matrices Elyot Grant∗ Piotr Indyk∗ December 4, 2012

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-06-10 19:22:49
3Notes on Randomized Algorithms CS: Fall 2014 James Aspnes:04

Notes on Randomized Algorithms CS: Fall 2014 James Aspnes:04

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-12-17 20:04:41
4Notes on Randomized Algorithms CS: Fall 2014 James Aspnes:04

Notes on Randomized Algorithms CS: Fall 2014 James Aspnes:04

Add to Reading List

Source URL: cs.yale.edu

Language: English - Date: 2014-12-17 20:04:41
5Sketch-Based Linear Value Function Approximation  Marc G. Bellemare University of Alberta  Joel Veness

Sketch-Based Linear Value Function Approximation Marc G. Bellemare University of Alberta Joel Veness

Add to Reading List

Source URL: jveness.info

Language: English - Date: 2012-11-09 12:10:55
6Algorithms  Lecture 12: Hash Tables [Fa’13] Insanity is repeating the same mistakes and expecting different results. — Narcotics Anonymous (1981)

Algorithms Lecture 12: Hash Tables [Fa’13] Insanity is repeating the same mistakes and expecting different results. — Narcotics Anonymous (1981)

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-12-28 09:02:37
7COMPUTNVG PRACTICES Using only a few simple and commonplace instructions, this algorithm efficiently maps variable-length text strings on to small integers.

COMPUTNVG PRACTICES Using only a few simple and commonplace instructions, this algorithm efficiently maps variable-length text strings on to small integers.

Add to Reading List

Source URL: epaperpress.com

Language: English - Date: 2011-12-28 10:41:56
8The Pre-images of Bitwise AND Functions in Forensic Analysis Kyriacos E. Pavlou and Richard T. Snodgrass  October 10, 2006

The Pre-images of Bitwise AND Functions in Forensic Analysis Kyriacos E. Pavlou and Richard T. Snodgrass October 10, 2006

Add to Reading List

Source URL: timecenter.cs.aau.dk

Language: English - Date: 2011-09-02 07:26:42
9May 2013 MADALGO seminar by Mikkel Thorup, University of Copenhagen The Power of Tabulation Hashing Abstract: Abstract Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield

May 2013 MADALGO seminar by Mikkel Thorup, University of Copenhagen The Power of Tabulation Hashing Abstract: Abstract Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield

Add to Reading List

Source URL: old-madalgo.au.dk

Language: English - Date: 2013-05-10 08:51:10
10STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2014-02-01 12:00:10