Geometry.Net - the online learning center
Home  - Sports - Hashing
e99.com Bookstore
  
Images 
Newsgroups
61-80 of 103    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hashing:     more books (72)
  1. Robin Hood hashing (Research report. University of Waterloo. Department of Computer Science) by Pedro Celis, 1986
  2. Relative prime transformation aids the minimal perfect hashing function by Celestina T Fung, 1986
  3. Dynamic file organizations for partial match retrieval based on linear hashing (Technical report. University of Minnesota. Institute of Technology. Computer Science Dept) by T. S Yuen, 1985
  4. A general purpose scatter storage subsystem and a comparison of hashing methods (SuDoc NAS 1.26:175814) by Steven C. Macy, 1984
  5. Searching on alphanumeric keys using local balanced trie hashing (Technical report. Carleton University. School of Computer Science) by Ekow J Otoo, 1987
  6. Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers (Lecture Notes in Computer Science)
  7. String Processing and Information Retrieval: 16th International Symposium, SPIRE 2009 Saariselkä, Finland, August 25-27, 2009 Proceedings (Lecture Notes ... Computer Science and General Issues)
  8. Cryptographic Libraries for Developers (Programming Series) by Ed Moyle, Diana Kelley, 2005-12-15
  9. Graph-Based Representations in Pattern Recognition: 7th IAPR-TC-15 International Workshop, GbRPR 2009, Venice, Italy, May 26-28, 2009. Proceedings (Lecture ... Vision, Pattern Recognition, and Graphics)
  10. Unique file identification in the National Software Reference Library [An article from: Digital Investigation] by S. Mead, 2006-09-01
  11. Accurate discovery of co-derivative documents via duplicate text detection [An article from: Information Systems] by Y. Bernstein, J. Zobel, 2006-11-01
  12. Searching algorithms (Teubner-Texte zur Mathematik) by J Wiedermann, 1987
  13. Using hash functions as a hedge against chosen ciphertext attack (Research report / International Business Machines Corporation. Research Division) by Victor Shoup, 1999
  14. A lexical analogy to feature matching and pose estimation (SuDoc C 13.58:6790) by John Albert Horst, 2002

lists with details

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  
61-80 of 103    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20