Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Hash-Sha'
Hash-Sha published presentations and documents on DocSlides.
A Scalable Content Addressable Network
by celsa-spraggs
Sylvia . Ratnasamy. , Paul Francis, Mark Handley,...
CBLOCK
by alexa-scheidler
:. An Automatic Blocking Mechanism for. Large-Sca...
Index Tuning
by tawny-fly
@ Dennis Shasha and Philippe Bonnet, 2013 . Outli...
Random Number Generation
by alexa-scheidler
CSCI 5857: Encoding and Encryption. Outline. D. e...
Cryptography
by yoshiko-marsland
Aalto . University. , . autumn. . 2012. Outline....
Topic 7:
by alida-meadow
Using cryptography in mobile computing. . Crypto...
Information Integrity and Message Digests
by kittie-lecroy
CSCI 5857: Encoding and Encryption. Outline. Info...
1 Convergent Dispersal:
by sherrill-nordquist
Toward Storage-Efficient Security . in a Cloud-of...
Distinct items:
by marina-yarberry
. Given a stream . , where . , count the number...
Sketching, Sampling and other
by debby-jeon
Sublinear. Algorithms:. Streaming. Alex Andoni. ...
Dovecot
by mitsue-stanley
M. ail Storage. Timo. . Sirainen. Me: . Timo. ....
What’s the Difference?
by marina-yarberry
Efficient Set Reconciliation without Prior Contex...
Joins on Encoded and Partitioned
by celsa-spraggs
Data. Jae-Gil Lee. 2*. . Gopi. Attaluri. 3. Ro...
CBLOCK
by ellena-manuel
:. An Automatic Blocking Mechanism for. Large-Sca...
S M Faisal*
by natalia-silvester
Hash in a Flash:. Hash Tables for Solid State Dev...
CS 4700 / CS 5700
by sherrill-nordquist
Network Fundamentals. Lecture 20: Malware, Botnet...
Overview on ZHT
by test
1. Introduction to . NoSQL. databases and CS554 ...
Energy-Efficient Query Processing on
by yoshiko-marsland
Embedded CPU-GPU Architectures. Xuntao Cheng. , B...
http://
by faustina-dinatale
www.flickr.com. /photos/. rofi. /2097239111/. Dat...
On the
by min-jolicoeur
Communication Complexity. of SFE. with Long Outpu...
Sports Field Maintenance & Design For Sustainability
by karlyn-bohler
-265-6003)September, 2009 ggg Hash Mark Syndrome -...
October 12, 2014
by debby-jeon
Hare School. What do hashers want from a hash tra...
Omelets served with choice of Hash Browns or American Fries, Home ...
by celsa-spraggs
- made Toast or one Pancake. All Omelets are made ...
Tempdb
by giovanna-bartolotta
Parasites. Jason Hall - Dir. of Client Services ...
CS 5600
by faustina-dinatale
Computer Systems. Lecture 12: . Authorization and...
Operating Systems Security
by yoshiko-marsland
1. The Boot Sequence. The action of loading an op...
Experiments!
by luanne-stotts
Direct Influence. Three Degrees of Influence. Alt...
Yimeng Zhang, Zhaoyin Jia and Tsuhan Chen
by kittie-lecroy
Cornell University. Image Retrieval with . Geomet...
Shanti
by natalia-silvester
. Bramhacharya. and Nick McCarty. Attacks and i...
Ashok
by faustina-dinatale
Anand. , . Aaron . Gember. -Jacobson. , . Collin ...
Aaron Nathan
by calandra-battersby
CS6464 Final Project. vapor_disk. . . . Ide...
Iris: A Scalable Cloud File
by kittie-lecroy
System. with . Efficient Integrity Checks. Marten...
Leak Pruning
by marina-yarberry
Michael Bond Kathryn McKinley. The University...
Public-Key Encryption in the Bounded-Retrieval Model
by sherrill-nordquist
Joël. Alwen, . Yevgeniy. . Dodis. , . Moni. ....
Dead Nonce List
by sherrill-nordquist
Junxiao. Shi 2014-09-19. Bug 1953: persistent lo...
Controlled malleability.
by marina-yarberry
Sanitizable. Signatures. Cristina . Onete. |...
Tracking Millions of Flows
by test
In . High . Speed Networks . for . Application Id...
A 64
by karlyn-bohler
Kbytes. ISL-TAGE . predictor. André . Seznec. I...
Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke1
by kittie-lecroy
Hash-Based IndexesChapter 11 Database Management S...
Algorithmic High-Dimensional Geometry 1
by calandra-battersby
Alex Andoni. (. Microsoft Research . SVC). Prism ...
Load More...