Hashing

Results: 1317



#Item
951Numerical analysis / Data analysis / Summary statistics / Nearest neighbor search / Locality-sensitive hashing / Normal distribution / Curse of dimensionality / Supervised learning / Central limit theorem / Statistics / Search algorithms / Machine learning

On the Difficulty of Nearest Neighbor Search Junfeng He [removed] Department of Electrical Engineering, Columbia University, New York, NY 10027, USA Sanjiv Kumar

Add to Reading List

Source URL: icml.cc

Language: English - Date: 2012-06-07 13:20:16
952Cache / Bloom filter / Information science / Information / Hash function / CPU cache / Trie / Cryptographic hash function / Cache algorithms / Hashing / Computing / Search algorithms

Bloom Filters in HBase Things you can toggle · HColumnDescriptor.setBloomFilterType(NONE | ROW | ROWCOL) to enable blooms per Column Family. Default = NONE ·

Add to Reading List

Source URL: issues.apache.org

Language: English
953Cryptographic hash functions / Crypt / Hashing / MD4 / MD5CRK / Cryptography / MD5 / Collision attack

Microsoft Word - Announcement-MD5-4.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-25 01:11:28
954Software / Bitcoin / Peer-to-peer computing / Financial cryptography / Hashing / Proof-of-work system / Public-key cryptography / Peer-to-peer / Electronic money / Cryptography / Computing / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: cs.umd.edu

Language: English - Date: 2014-06-04 21:55:42
955Hashing / MD4 / Bart Preneel / Preimage attack / Hash list / Hash function / RIPEMD / Cryptography / Cryptographic hash functions / Error detection and correction

PDF Document

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-08-19 15:26:30
956Cryptographic hash functions / Hashing / Advanced Encryption Standard / FIPS 140-2 / Cryptographic Module Validation Program / SHA-2 / OpenSSL / FIPS 140 / SHA-1 / Cryptography / Cryptography standards / Cryptographic software

PDF Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2012-06-26 20:45:21
957Cryptographic hash functions / Hashing / Advanced Encryption Standard / HMAC / SHA-2 / OpenSSL / FIPS 140-2 / FIPS 140 / SHA-1 / Cryptography / Cryptographic software / Cryptography standards

PDF Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2010-12-08 14:19:25
958Information retrieval / Information science / Error detection and correction / Hash table / Hash function / Cryptographic hash functions / Hash list / Trie / Hash / Hashing / Search algorithms / Computing

PDF Document

Add to Reading List

Source URL: www2.sas.com

Language: English - Date: 2006-03-01 09:39:45
959Computing / Information science / Hash function / Hash table / Cardinality / Time complexity / Estimation theory / Lookup table / Relational database / Search algorithms / Hashing / Theoretical computer science

PDF Document

Add to Reading List

Source URL: dblab.kaist.ac.kr

Language: English - Date: 2000-07-20 02:26:40
960Cryptographic hash functions / Hashing / Advanced Encryption Standard / Cryptographic Module Validation Program / FIPS 140-2 / OpenSSL / Open Source Software Institute / SHA-2 / FIPS 140 / Cryptography / Cryptography standards / Cryptographic software

PDF Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2007-12-13 15:11:03
UPDATE