<--- Back to Details
First PageDocument Content
Hashing / Cryptographic hash functions / Error detection and correction / Web archiving / Digital libraries / Digital preservation / Merkle tree / SHA-1 / Hash function / Wayback Machine / Hash list / Database
Date: 2009-05-12 14:48:13
Hashing
Cryptographic hash functions
Error detection and correction
Web archiving
Digital libraries
Digital preservation
Merkle tree
SHA-1
Hash function
Wayback Machine
Hash list
Database

Microsoft Word - Indo-US-Workshop-jaja.doc

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Download Document from Source Website

File Size: 150,33 KB

Share Document on Facebook

Similar Documents

Algebra / Mathematics / Computing / Search algorithms / Data types / Vectors / Hashing / Error detection and correction / Hash function / Association list / Abstract data type / Hash table

Microsoft PowerPoint - Lect12advanced_data.ppt

DocID: 1qKBn - View Document

Hashing / Information retrieval / Information science / Search algorithms / Hash table / Hash function / Quadratic probing / Cryptographic hash function / Linear probing / Trie / Double hashing / Hash list

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Erik Demaine, Piotr Indyk, and Manolis Kellis February 15, 2011 Problem Set 2 Solutions

DocID: 1qrSH - View Document

Distributed data storage / Computing / Computer programming / Software engineering / Distributed hash table / Tapestry / Chord / Consistent hashing / Pastry / Linked list / Node / Trie

Glacier: Highly durable, decentralized storage despite massive correlated failuresāˆ— Andreas Haeberlen Alan Mislove

DocID: 1q0Ep - View Document

Computing / Software / Cryptographic hash functions / Error detection and correction / Hashing / Checksum / SHA-1 / Sha1sum / Hash list / OneDrive / Hash function / Zip

CE318/CE818: High-level Games Development Assignment Submission Procedure Due to the latest problems with the file capacity in Faser, we are going to establish the following procedure to upload your games so we can downl

DocID: 1pM6D - View Document

BitTorrent / File sharing networks / Information theory / Error detection and correction / Tit for tat / Seeding / Linear network coding / EigenTrust / Leech / Peer-to-peer / Matrix / Hash list

Rescuing Tit-for-Tat with Source Coding Thomas Locher, Stefan Schmid, Roger Wattenhofer {lochert, schmiste, wattenhofer}@tik.ee.ethz.ch Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzer

DocID: 1pKZn - View Document