Home - Sports - Hashing |
Page 2 21-40 of 75 Back | 1 | 2 | 3 | 4 | Next 20 |
21. Dynamic Hashing Schemes A new type of dynamic file access called dynamic hashing has recently emerged. It promises the flexibility of handling dynamic files while preserving the http://portal.acm.org/citation.cfm?id=330532 |
22. Dchashing.org/net/com Weekly calendar of local hashes. Coming Local Events . . . WH4 Holiday Party. Saturday, January 26th,2008 8pm2am Finn macCool s Irish PublickHouse http://www.dchashing.org/ | |
|
23. Libketama - A Consistent Hashing Algo For Memcache Clients â RJâs Jour This meant that whenever we added or removed servers from the pool, everything hashed to different servers, which effectively wiped the entire cache. http://www.last.fm/user/RJ/journal/2007/04/10/392555/ | |
|
24. How To Use Maresware To Validate Voter Machine Software. A procedure using Hash and Hashcmp programs (based on the MD5 and SHA algorithm) Using hashing , as it is called, they can authenticate electronic data http://www.dmares.com/maresware/articles/hash_faqs.htm | |
|
25. MD5 Hashing Function - Version 1.0 The following example shows a valid MD5 resinfo extension with two MD5 hashes of the referenced information resource. The first without a date, http://www.w3.org/TR/1998/REC-DSig-label/MD5-1_0 | |
|
26. Hashing A small paper that explains how hashing works with examples in Pascal. http://www.palfrader.org/hashing/ | |
|
27. Java Theory And Practice: Hashing It Out In this installment of Java theory and practice, Java developer Brian Goetz shows you the rules and guidelines you should follow when creating Java classes http://www.ibm.com/developerworks/java/library/j-jtp05273.html | |
|
28. Hashing In Forth hashing provides a fast way to search a large, unsorted data set at the cost of extra memory. Robert Sedgewick, in his book Algorithms, concisely describes http://www.forth.org/fd/hash.html | |
|
29. Tom White: Consistent Hashing I ve bumped into consistent hashing a couple of times lately. The paper that introduced the idea (Consistent hashing and Random Trees Distributed Caching http://problemsworthyofattack.blogspot.com/2007/11/consistent-hashing.html | |
|
30. What Is Hashing? The trail consists of chalk or flour marks, or pieces of paper, depending on the particular hash. The trail can be prelaid or begun just a few minutes http://www.kobehash.com/what.htm | |
|
31. BioRUST.com :: Tutorials >> Md5() Hashing Using PHP md5() converts a string of text into a 32character hash, using a secret algorythm, so as to protect its source. md5() encrypted......Tutorial http://biorust.com/tutorials/detail/99/en/ | |
|
32. Portable PHP Password Hashing Framework A portable public domain password hashing framework for use in PHP applications. Tested with PHP 3, 4, and 5. http://www.openwall.com/phpass/ | |
|
33. Hashing Thycotic Software developer Kevin Jones discusses hashing and in particular, SHA512. He provides an overview of what hashing is as well as the risks, http://www.thycotic.com/articles_hashing.html | |
|
34. PlanetMath: Hashing hashing refers to an information storage and retrieval technique which is very widely used in realworld applications. There many more potential places it http://planetmath.org/encyclopedia/LinearProbing.html | |
|
35. Seletar Hash House Harriers, Singapore The Hash House Harriers is a running/drinking/social club which was started by bored expatriates in Kuala Lumpur, Malaysia in 1938. ( Hash House is the http://seletar.hash.org.sg/hashingSH3.html | |
|
36. Phil Dawes’ Stuff » Blog Archive » Hashing Searching Sketching In particular it includes a remarkable recent observation for the improvement of hash tables Hash table loading and performance can be dramatically http://www.phildawes.net/blog/2007/03/08/hashing-searching-sketching/ | |
|
37. Hashing [CiteSeer; NEC Research Institute; Steve Lawrence, Kurt DDH extends the idea of dynamic hashing algorithms to distributed systems. DDH spreads data across multiple servers in a network using a novel autonomous http://citeseer.ist.psu.edu/SoftwareEngineering/DataStructures/Hashing/ |
38. Hashing - Advanced .NET Encryption And Hashing Library The Best Tool For Hashing hashing Advanced .NET encryption and hashing library The best tool for hashing and checksumming. http://hashing.qarchive.org/ | |
|
39. Geometric Hashing An Overview Your browser may not have a PDF reader available. Google recommends visiting our text version of this document. http://ieeexplore.ieee.org/iel4/99/13939/00641604.pdf |
40. PwdHash The user can activate this hashing by choosing passwords that start with a PwdHash must somehow recognize the old password field and avoid hashing it. http://crypto.stanford.edu/PwdHash/ | |
|
Page 2 21-40 of 75 Back | 1 | 2 | 3 | 4 | Next 20 |