Hash table

Results: 1003



#Item
901Scatternet / Distributed data storage / Telecommunications engineering / Piconet / Routing / Dominator / Distributed hash table / Network topology / Bluetooth / Technology / Computing

1 Hierarchical Self-routing Scatternet for Multihop

Add to Reading List

Source URL: www.cs.iit.edu

Language: English - Date: 2005-12-30 10:40:11
902Information retrieval / Information science / Bloom filter / Hash table / Hash function / Perfect hash function / Bit array / Set / Universal hashing / Search algorithms / Hashing / Computing

An Optimal Bloom Filter Replacement∗ Anna Pagh†

Add to Reading List

Source URL: www.it-c.dk

Language: English - Date: 2004-10-18 07:07:06
903Password / Rainbow table / Salt / One-time password / Cryptographic hash function / Crypt / Security token / Passphrase / Two-factor authentication / Security / Computer security / Cryptography

K:Journal ปีที่ 8 เล่มที่ 2

Add to Reading List

Source URL: suanpalm3.kmutnb.ac.th

Language: English - Date: 2013-01-28 01:59:46
904Information retrieval / Locality-sensitive hashing / Nearest neighbor search / Hash function / K-nearest neighbor algorithm / Hash table / K-d tree / Voronoi diagram / Ε-approximate nearest neighbor search / Search algorithms / Information science / Artificial intelligence

Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions by Alexandr Andoni and Piotr Indyk

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-05-12 20:31:10
905Artificial intelligence / K-d tree / K-nearest neighbor algorithm / Hash function / Hash table / Best bin first / Search engine indexing / Geometric hashing / Database index / Information science / Search algorithms / Information retrieval

Shape Indexing Using Approximate Nearest-Neighbour Search in High-Dimensional Spaces Jeffrey S. Beis and David G. Lowe

Add to Reading List

Source URL: www.cs.ubc.ca

Language: English - Date: 1997-07-29 19:05:04
906Provably secure cryptographic hash function / Preimage attack / Universal one-way hash function / Hash function / Collision resistance / SHA-1 / Rainbow table / Crypt / Hash list / Cryptographic hash functions / Cryptography / Error detection and correction

Provably Secure Cryptographic Hash Functions

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2006-12-20 22:26:42
907Distributed computing / Distributed hash table / Chord / Peer-to-peer / Tapestry / Content addressable network / Overlay network / Pastry / Network topology / Distributed data storage / Computing / Concurrent computing

Spotlight Overlay

Add to Reading List

Source URL: www.dynamicobjects.com

Language: English - Date: 2011-11-02 17:19:00
908Information science / Trie / Tower of Hanoi / Hash table / Breadth-first search / A* search algorithm / B-tree / Search algorithms / Artificial intelligence / Mathematics

Large-Scale Parallel Breadth-First Search Richard E. Korf and Peter Schultze Computer Science Department

Add to Reading List

Source URL: www.aaai.org

Language: English - Date: 2006-01-11 01:19:46
909High-definition television / Digital media / Information science / China Blue High-definition Disc / Key management / Media Key Block / AACS LA / Video / Hash table / Advanced Access Content System / DVD / Cryptography

Advanced Access Content System (AACS) CBHD Pre-recorded Book Intel Corporation

Add to Reading List

Source URL: www.aacsla.com

Language: English - Date: 2010-03-12 04:31:10
910Hashing / Information retrieval / Artificial intelligence / Error detection and correction / Hash function / Bloom filter / Hash table / One-way compression function / Cryptography / Search algorithms / Cryptographic hash functions

Space/Time Trade-offs in Hash Coding with Allowable Errors

Add to Reading List

Source URL: crystal.uta.edu

Language: English - Date: 2005-04-12 16:14:35
UPDATE