Sciweavers

208 search results - page 11 / 42
» Variationally universal hashing
Sort
View
FSE
1997
Springer
246views Cryptology» more  FSE 1997»
15 years 1 months ago
Fast Message Authentication Using Efficient Polynomial Evaluation
Abstract. Message authentication codes (MACs) using polynomial evaluation have the advantage of requiring a very short key even for very large messages. We describe a low complexit...
Valentine Afanassiev, Christian Gehrmann, Ben J. M...
APAL
2002
105views more  APAL 2002»
14 years 9 months ago
Saturated models of universal theories
A notion called Herbrand saturation is shown to provide the modeltheoretic analogue of a proof-theoretic method, Herbrand analysis, yielding uniform model-theoretic proofs of a nu...
Jeremy Avigad
60
Voted
VLDB
1994
ACM
101views Database» more  VLDB 1994»
15 years 1 months ago
Memory-Contention Responsive Hash Joins
In order to maximize systemperformancein environments with fluctuating memory contention, memory-intensive algorithms such as hash join must gracefully adapt to variations in avai...
Diane L. Davison, Goetz Graefe
ICDE
2012
IEEE
343views Database» more  ICDE 2012»
13 years 2 days ago
Bi-level Locality Sensitive Hashing for k-Nearest Neighbor Computation
We present a new Bi-level LSH algorithm to perform approximate k-nearest neighbor search in high dimensional spaces. Our formulation is based on a two-level scheme. In the first ...
Jia Pan, Dinesh Manocha
FUIN
2002
100views more  FUIN 2002»
14 years 9 months ago
UPSILON: Universal Programming System with Incomplete Lazy Object Notation
This paper presents a new model of computation that differs from prior models in that it emphasizes data over flow control, has no named variables and has an object-oriented flavo...
Brian Postow, Kenneth W. Regan, Carl H. Smith