Sciweavers

4438 search results - page 9 / 888
» On the Distribution of Keys by Hashing
Sort
View
TOIS
2002
97views more  TOIS 2002»
14 years 11 months ago
Burst tries: a fast, efficient data structure for string keys
Many applications depend on efficient management of large sets of distinct strings in memory. For example, during index construction for text databases a record is held for each d...
Steffen Heinz, Justin Zobel, Hugh E. Williams
ICDE
2005
IEEE
146views Database» more  ICDE 2005»
15 years 5 months ago
Best Effort Query Processing in DHT-based P2P Systems
Structured P2P systems in the form of distributed hash tables (DHT) are a promising approach for building massively distributed data management platforms. However, for many applic...
Philipp Rösch, Kai-Uwe Sattler, Christian von...
70
Voted
ACISP
2005
Springer
15 years 5 months ago
On the Possibility of Constructing Meaningful Hash Collisions for Public Keys
It is sometimes argued (as in [6]) that finding meaningful hash collisions might prove difficult. We show that at least one of the arguments involved is wrong, by showing that for...
Arjen K. Lenstra, Benne de Weger
CORR
2010
Springer
196views Education» more  CORR 2010»
14 years 11 months ago
Comparison Of Modified Dual Ternary Indexing And Multi-Key Hashing Algorithms For Music Information Retrieval
In this work we have compared two indexing algorithms that have been used to index and retrieve Carnatic music songs. We have compared a modified algorithm of the Dual ternary ind...
Rajeswari Sridhar, A. Amudha, S. Karthiga, T. V. G...
CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
15 years 3 months ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway