<--- Back to Details
First PageDocument Content
Information retrieval / Information science / Hashing / Search algorithms / Universal hashing / Hash table / Linear probing / Hash function / Bloom filter / Cuckoo hashing / Randomness extractor / Cryptographic hash function
Date: 2007-11-16 13:42:30
Information retrieval
Information science
Hashing
Search algorithms
Universal hashing
Hash table
Linear probing
Hash function
Bloom filter
Cuckoo hashing
Randomness extractor
Cryptographic hash function

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard University

Add to Reading List

Source URL: www.eecs.harvard.edu

Download Document from Source Website

File Size: 247,55 KB

Share Document on Facebook

Similar Documents

CS378, MA375T, PHY341  Homework 1 Homework 1 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 1 Homework 1 Introduction to Quantum Information Science

DocID: 1xVZC - View Document

CS378, MA375T, PHY341  Homework 2 Homework 2 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 2 Homework 2 Introduction to Quantum Information Science

DocID: 1xVYW - View Document

GOV200X – The Politics of Plague Worcester Polytechnic Institute Social Science and Policy Studies Department Sample Syllabus Course Information Professor Patricia Stapleton

GOV200X – The Politics of Plague Worcester Polytechnic Institute Social Science and Policy Studies Department Sample Syllabus Course Information Professor Patricia Stapleton

DocID: 1xVN2 - View Document

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

DocID: 1xVHD - View Document

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

DocID: 1xVEY - View Document