Hash tree

Results: 206



#Item
191Computer programming / Distributed hash table / Trie / Hash table / Peer-to-peer / Content addressable network / Hash tree / Gnutella / Hash function / Distributed data storage / Computing / Prefix hash tree

Brief Announcement: Prefix Hash Tree Sriram Ramabhadran

Add to Reading List

Source URL: www.icsi.berkeley.edu

Language: English - Date: 2010-07-14 20:36:42
192Information retrieval / Error detection and correction / Information / Hash table / Hash function / Trie / Extendible hashing / Cryptographic hash function / B-tree / Information science / Search algorithms / Hashing

Extendible Hashing-A Fast Access Method for Dynamic Files

Add to Reading List

Source URL: www.informatik.uni-jena.de

Language: English - Date: 2005-11-08 01:51:24
193Computer programming / Segment tree / Peer-to-peer / Prefix hash tree / Bin / Distributed hash table / Interval tree / Distributed data storage / Computing / Graph theory

Distributed Segment Tree: A Unified Architecture to Support Range Query and Cover Query Guobin Shen, Changxi Zheng, Wei Pu, and Shipeng Li

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-08-31 18:56:06
194Information retrieval / Locality-sensitive hashing / Nearest neighbor search / Hash function / K-nearest neighbor algorithm / Hash table / K-d tree / Voronoi diagram / Ε-approximate nearest neighbor search / Search algorithms / Information science / Artificial intelligence

Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions by Alexandr Andoni and Piotr Indyk

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-05-12 20:31:10
195Artificial intelligence / K-d tree / K-nearest neighbor algorithm / Hash function / Hash table / Best bin first / Search engine indexing / Geometric hashing / Database index / Information science / Search algorithms / Information retrieval

Shape Indexing Using Approximate Nearest-Neighbour Search in High-Dimensional Spaces Jeffrey S. Beis and David G. Lowe

Add to Reading List

Source URL: www.cs.ubc.ca

Language: English - Date: 1997-07-29 19:05:04
196Error detection and correction / Key management / Merkle signature scheme / Cryptographic hash function / Digital signature / Hash tree / Key generation / Cryptographically secure pseudorandom number generator / Trie / Cryptography / Public-key cryptography / Hashing

Merkle Signatures with Virtually Unlimited Signature Capacity Johannes Buchmann1 , Erik Dahmen1 , Elena Klintsevich1 ,

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Language: English - Date: 2007-07-10 07:26:05
197Cryptographic hash function / Hash tree / Digital signature / Collision resistance / Hash function / Lamport signature / One-way compression function / Cryptography / Preimage attack / Merkle signature scheme

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: imperia.rz.rub.de

Language: English - Date: 2009-12-11 06:33:14
198Information science / Trie / Tower of Hanoi / Hash table / Breadth-first search / A* search algorithm / B-tree / Search algorithms / Artificial intelligence / Mathematics

Large-Scale Parallel Breadth-First Search Richard E. Korf and Peter Schultze Computer Science Department

Add to Reading List

Source URL: www.aaai.org

Language: English - Date: 2006-01-11 01:19:46
199Cryptographic hash functions / B-tree / Computing / Computer programming / Hash tree / Hash function / B+ tree / Trie / Binary tree / Hashing / Error detection and correction / Cryptography

Dynamic Authenticated Index Structures for Outsourced Databases Feifei Li†

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2009-12-07 16:22:51
200Computing / B-tree / Computer programming / R-tree / T-tree / Hash table / Trie / Hash function / Linked list / Graph theory / Binary trees / Search algorithms

PDF Document

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 01:37:12
UPDATE