Geometry.Net - the online learning center
Home  - Sports - Hashing
e99.com Bookstore
  
Images 
Newsgroups
Page 3     41-60 of 75    Back | 1  | 2  | 3  | 4  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hashing:     more books (72)
  1. Internal hashing for dynamic and static tables by T. G Lewis, 1988
  2. Multilevel trie hashing (Rapports de recherche. Institut National de Recherche en Informatique et en Automatique) by W Litwin, 1987
  3. Latency-sensitive hashing for collaborative web caching (Research report RC. International Business Machines Corporation. Research Division) by Kun-Lung Wu, 2000
  4. Parallel hashing: An efficient implementation of shared memory (Research Report RJ. International Business Machines Corporation. Research Division) by Anna R Karlin, 1986
  5. Split sequence coalesced hashing (Technical report) by D Murthy, 1988
  6. Hashing-based traffic splitting algorithms for internet load balancing (GIT-CC) by Zhiruo Cao, 1999
  7. An experimental method of study for minimal perfect hashing function: Reciprocal hashing by Dusaneya Somsiri, 1987
  8. Analysis of some new variants of coalesced hashing (Techincal report / Brown University, Dept. of Computer Science) by Wen-Chin Chen, 1984
  9. Universal hashing in VLSI: (extended abstract) (Technical report. Pennsylvania State University. Dept. of Computer Science) by Martin Furer, 1987
  10. An extended study on ordered minimal perfect hashing scheme by Li-Pan Huang, 1986
  11. Deletion algorithms for coalesced hashing (Technical report / Brown University, Dept. of Computer Science) by Wen-Chin Chen, 1984
  12. An algorithm for garbage collecting in a hashing environment (Technical report - Indiana University, Computer Science Department) by Daniel P Friedman, 1976
  13. Hashing moving objects (Computer science technical report series CS-TR) by Zhexuan Song, 2000
  14. Hashing: Masters for making overhead slides (OSU-CS-TR) by George E Hedrick, 1995

41. Java Community News - What Is Consistent Hashing And Why You
When objects are distributed across caches, classes should define consistent hash functions, writes Tom White in a recent article explaining the benefits of
http://www.artima.com/forums/flat.jsp?forum=276&thread=219807

42. About Hashing
The Summit Hash House Harriers were founded in 1980 as a mixed hash (men and women). We have had over 1000 hash runs as of April, 2006.
http://www.hashnj.com/about.htm
The Summit Hash House Harriers were founded in 1980 as a mixed hash (men and women). We have had over 1000 hash runs as of April, 2006. Each run has been unique, unpredictable, occasionally messy, but always fun.
What is Hashing?
Running through some of the most remote and exotic terrain in the world, while enjoying the satisfaction of quenching the resulting thirst by the consumption of more than adequate amounts of liquid refreshment, the Hash House Harriers have been described as "The drinking club with a running problem." The general idea: the "hare" for the week sets a trail for the "hounds" to follow. The hash run follows an unpredictable cross-country trail laid with simple trail-marks showing the way. A crafty hare will set "false trails," trying to foul-up the Front Running Bastards (FRB's) in the group, thus allowing the pack the opportunity to catch up. To make sure that the group stays together, harriers yell "ON-ON" when they see a trail-mark and are heading in the right direction. Shortcutting is a well respected skill of the seasoned harrier! That being said, the "hounds" follow the trail laid by the "hare" with the ultimate goal of reaching the refreshment at the end.

43. Hashing: The Beer Run That Works Up A Sweat — JSCMS
*****SMALL IMAGE 1200x1791**** Hashers of the DC Hash House Harriers slither through the mud of the Eastern Shore in Maryland on their way to their
http://jscms.jrn.columbia.edu/cns/2006-03-14/oneill-hashing
Skip to content
Index

44. El Que Esta Ahí­ Y Dice Cosas » Blog Archive » Hashing
Today I spent some time thinking about hashing in SymPy. hashing is a central part of sympy and is implemented in the core. Now you might be thinking why is
http://grupododo.com/seo/?p=95

45. AppDev: Something You Should Know By Irena Kennedy : SYSK 89: Hashing Explained.
But what is hashing? hashing is a process of applying one of many hash algorithms. It’s frequently used to create/use hash tables, which significantly.
http://blogs.msdn.com/irenak/archive/2006/03/23/558838.aspx
Welcome to MSDN Blogs Sign in Join Help
AppDev: Something You Should Know by Irena Kennedy
Everything that is related to application development, and other cool stuff...
This Blog
Syndication
Search
Tags
Archives
SYSK 89: Hashing Explained...
So, you hear all the time – Hashtable, hash value, etc. You’ve seen GetHashCode method in Object type. But what is hashing? Hashing is a process of applying one of many hash algorithms. It’s frequently used to create/use hash tables, which significantly increase search efficiency making it a constant time O(1) (compare that binary tree search, which is a function of O(logn)). A hash table is simply an array of data (the actual table where the data to be searched is stored) and a mapping function, known as a hash function. http://en.wikipedia.org/wiki/Hash_function site gives the following definition: A hash function or hash algorithm is a function for examining the input data and producing an output of a fixed length, called a hash value. Two different inputs are unlikely to hash to the same hash value. There are many hash functions. You might’ve heard of secure hash algorithms such as SHA, or other like MD2, MD4, MD5, etc. But to understand it, let’s look at two simple examples below (as Damien Morton correctly stated in the comment below, these are not good examples for "real-life" usage, but they do convey the point in an easy to understand way):

46. What Is TTH (Tiger Tree Hashing) ? DC++ FAQ / Direct Connect FAQ - Dslreports.co
What is TTH (Tiger Tree hashing) ? DC++ FAQ / Direct Connect FAQ frequently asked question.
http://www.dslreports.com/faq/9677
S earch:
login
register Home Find Service ...
how-to block ads

Search for: in all FAQs
All FAQs DC++ FAQ / Direct Connect FAQ 5.1 Features
What is TTH (Tiger Tree Hashing) ?
Tiger Tree Hashing (TTH) is used to verify the integrity of large chunks of data. The data is split into small pieces which are individually hashed, then hashed together until one root hash is formed. A TTH looks something like: . Detailed information can be found here . DC++ 0.400 introduced mandatory TTH. Once DC++ hashes all of your share (yes, this will take a while), it will only hash new files. The hashing thread in DC++ is set to low priority, so it shouldn't interfere too badly. There are several benefits of file hashing: not mean they are the same bitwise!
Magnet Links
. Implemented in DC++ 0.4032. More information in this FAQ
not verify that the files are the same (except for the size and partial name), which can result in corrupt files. A file hash ensures the files are identical.
Tips to Speed up Hashing Use an 80 pin IDE cable.

47. How To: Hash Data With Salt (C#/VB.NET)
Sample Code hashing data in C .NET and VB.NET using MD5, SHA1, SHA256, SHA384, and SHA512 algoritnms.
http://www.obviex.com/samples/hash.aspx
Home Buy Support Products ... Site Map How To: Hash Data with Salt (C#/VB.NET) The code below demonstrates how to hash data and verify hashes. It supports MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashing algorithms. To help reduce the risk of dictionary attacks, the code appends random bytes (so-called "salt") to the original plain text before generating hashes. Please keep in mind that salt can only help against prebuilt dictionaries. If an intruder gets access to your system and uses a brute force attack, salt will not provide much value. Code samples are provided in C# and Visual Basic.NET . IMPORTANT: DATA HASHES CANNOT BE "DECRYPTED" BACK TO PLAIN TEXT. Notes
These examples are offered for demonstration purpose only. In a real application you may need to modify the code to make it more efficient. For example, instead of appending salt values to generated hashes, you may want to store them separately. Another performance improvement can be achieved by not converting results into base64-encoded strings, but manipulating them in a byte array format. For additional information about hashing, check MSDN sample describing how to use password hashes stored in a database for user authentication. See also the

48. Algorithm Implementation/Hashing - Wikibooks, Collection Of Open-content Textboo
Indexing algorithms hashes are generally used to speed location of items within lists. Cyclic Redundancy Checks are based on polynomial expressions and are
http://en.wikibooks.org/wiki/Algorithm_implementation/Hashing
Algorithm implementation/Hashing
From Wikibooks, the open-content textbooks collection
Algorithm implementation Jump to: navigation search Hashing algorithms are generically split into three sub-sets:
  • Indexing Algorithms Cyclic Redundancy Checks Message Digests
Indexing algorithms hashes are generally used to speed location of items within lists. Cyclic Redundancy Checks are based on polynomial expressions and are often used for simple data checking. Message Digests are often used in applications requiring cryptographically secure one-time pads and many are closely examined for their security widely in the computer security field.
edit Indexing Algorithms
Wikipedia has more about this subject: Hash table The "Jenkins One-at-a-time hash", from an article by Bob Jenkins in Dr. Dobb's September 1997.
edit Cyclic Redundancy Checks
Wikipedia has more about this subject: Cyclic redundancy check
  • CRC16 CCITT CRC16 XModem CRC32 / FCS32 - commonly used in Ethernet and PKZip-compatible archiving
edit Message Digests
Wikipedia has more about this subject: Message digest Retrieved from " http://en.wikibooks.org/wiki/Algorithm_implementation/Hashing

49. Hashraleigh.com - Hashing Doesn't Suck.
When and where to run with the Carolina Larrikins Hash House Harriers, and who to ask about them, a club running pickup trails in the Triangle area.
http://www.hashraleigh.com/
Contribute Advanced Search Site Statistics Directory ... Calendar Hashing doesn't suck.
advanced search
Topics
Home hashraleigh.com Triangle H3 Sir Walter's H3 Carolina Larrikin H3 ... Interhashes
Features
Photo Gallery
Buy TrH3 gear

Welcome!

Submit a story!
User Functions
Username
Password

Don't have an account yet? Sign up as a New User
Lost your password
Events
There are no upcoming events
Older Stories
Monday 01-Oct
Wednesday 05-Sep
Monday 03-Sep
Tuesday 14-Aug
Monday 13-Aug
Tuesday 31-Jul
Friday 27-Jul
Monday 16-Jul

50. RFC 2104 HMAC: Keyed-Hashing For Message Authentication
HMAC Keyedhashing for Message Authentication. H. Krawczyk, M. Bellare, R. Canetti. February 1997.
http://www.tools.ietf.org/html/rfc2104
RFCs/IDs Plain Text ] [From draft-ietf-ipsec-hmac-md5
INFORMATIONAL
Errata

Network Working Group H. Krawczyk Request for Comments: 2104 IBM Category: Informational M. Bellare UCSD R. Canetti IBM February 1997 HMAC: Keyed-Hashing for Message Authentication Status of This Memo This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. . Introduction Providing a way to check the integrity of information transmitted over or stored in an unreliable medium is a prime necessity in the world of open computing and communications. Mechanisms that provide such integrity check based on a secret key are usually called "message authentication codes" (MAC). Typically, message authentication codes are used between two parties that share a secret key in order to validate information transmitted between these parties. In this document we present such a MAC mechanism based on cryptographic hash functions. This mechanism, called HMAC, is based on work by the authors [

51. Hashing Java - OWASP
The only way to go past this would be a brute force attack, i.e. computing the hash of all possible passwords or a dictionary attack, i.e. computing all the
http://www.owasp.org/index.php/Hashing_Java
Hashing Java
From OWASP
Jump to: navigation search
Contents
Status
Released 14/1/2008
Introduction
Most of today’s applications use login/password in order to authenticate. Users often use the same login/password for different kinds of applications. If the couple is stolen, everybody can access all the applications the user has access to. Too often passwords are stored as clear text. Thus the password can be read directly by the database’s administrator, super users or SQL Injection attack etc. The backup media is also vulnerable. In order to solve this problem, passwords must be stored encrypted. Two kinds of encryption are available:
  • One way functions (SHA-256 SHA-1 MD5, ..;) also known as Hashing functions Reversible encryption functions (DES, AES, …).
However, the reversible property of encryption function is useless for credentials storing (cf. OWASP Guide v2.0.1) : Passwords are secrets. There is no reason to decrypt them under any circumstances. Helpdesk staff should be able to set new passwords (with an audit trail, obviously), not read back old passwords. Therefore, there is no reason to store passwords in a reversible form.
Definition of cryptographic Hashing function:
A Hash function creates a fixed length small fingerprint (or message digest) from an unlimited input string.

52. PH3 - Hashing Details And Hashing Links
The area around Pattaya is ideal for hashing and with some great scenery. By far the largest hash in town is the Pattaya Monday Hash (PH3) which is
http://www.pattayah3.com/hashing.html
Hashing Details and Hashing Links
Home Page This page last updated: January 21, 2008 Links on this page Upcoming International/local events
Links To Hashing clubs in Thailand

Hashing in Pattaya
Hashers, Are You Looking for Accommodation in Pattaya
Jasmine Hotel Why not check into Karamba's Place A Hasher owned Hotel is available for all Hashers who are planning to stay in Pattaya during their vacations. There is a 15% discount available on all rooms to any Hashers wishing to stay. Situated on Soi BJ just 80 Metres from the beach. We have 59 rooms and will be adding another 18 rooms with balconies on the fifth floor during this year.
Dr. Boossakorn Saisorn and Karamba (Hotel Owner) enjoying an evening meal.
Recommended Hasher accommodation for Renting
S.K.T. Villas in Naklua (A hasher owned property)
Two story Detached house for Rent (A hasher owned property)
Hashing in Pattaya
The area around Pattaya is ideal for hashing and with some great scenery. By far the largest hash in town is the Pattaya Monday Hash (PH3) which is averaging about 90 runners per week at the moment. The Pattaya Monday Hash (PH3) was formed on the 7th January 1984 by Hans and Molly Kirgis with the help of Bill '

53. Web Caching With Consistent Hashing
In this paper, we offer a new web caching strategy based on consistent hashing. Consistent hashing provides an alternative to multicast and directory
http://www8.org/w8-papers/2a-webserver/caching/paper2.html
Web Caching with Consistent Hashing
by David Karger Alex Sherman Andy Berkheimer, Bill Bogstad, Rizwan Dhanidina Ken Iwamoto, Brian Kim, Luke Matkins, Yoav Yerushalmi. MIT Laboratory for Computer Science
Abstract:
A key performance measure for the World Wide Web is the speed with which content is served to users. As traffic on the Web increases, users are faced with increasing delays and failures in data delivery. Web caching is one of the key strategies that has been explored to improve performance. An important issue in many caching systems is how to decide what is cached where at any given time. Solutions have included multicast queries and directory schemes. In this paper, we offer a new web caching strategy based on consistent hashing. Consistent hashing provides an alternative to multicast and directory schemes, and has several other advantages in load balancing and fault tolerance. Its performance was analyzed theoretically in previous work; in this paper we describe the implementation of a consistent-hashing based system and experiments that support our thesis that it can provide performance improvements.
Keywords:
Caching Hashing Consistent
  • Introduction
    1 Introduction
    As the World Wide Web becomes a dominant medium for information distribution, mechanisms for delivering web traffic efficiently and reliably are needed. However, today's data delivery methods are prone to unpredictable delays and frequent failures. Two main of these delays and failures are congested networks and swamped servers. Date travels slowly through congested networks. Swamped servers (facing more simultaneous requests than their resources can support) will either refuse to serve certain requests or will serve them very slowly. Network congestion and server swamping are common because network and server infrastructure expansions has not kept pace with the tremendous growth in Internet use.

54. Origins Of Hashing
The Hash House Harriers had its humble beginnings in 1938 with an Englishman named Albert Stephen Ignatius Gispert, in what is now Malaysia.
http://www.iwakuniwsh3.org/Hash-History.htm
Hash History Most this recount has been shamelessly stolen from Hazukashii's GoToTheHash.net and the images from ZiPpY's Harrier.net check out their information loaded sites I happened across this article while flying from the IPOH post-lube back to Kuala Lumpur after World InterHash 1998 (In the Malaysian Airlines Magazine). It is the best article I have seen on the origin of hashing. It was no doubt relayed from someone over a beer in the Selangor Club. On-On and Enjoy,
Hazukashii

The celebrated running event has a colorful history. The original idea was to mimic the Hare and Hounds or Fox and Hounds style chases that have been around for centuries in one form or another. Some "gentle-men" substituted men for the game in an effort to add something different to the sport. There is evidence of this in colonial America as well as in England. It seemed a logical development then, to substitute the hounds with runners as well. Men, not as well endowed as dogs with a sense of smell, required a trail of some sort to track their quarry. Paper seemed the ideal solution. This sport was well entrenched long before these sportsmen became known as "hashers" and the sport was referred to as Hounds and Hares or the Paper Chase.
The Hash House Harriers had its humble beginnings in 1938 with an Englishman named Albert Stephen Ignatius Gispert, in what is now Malaysia. Having a fondness for the "paper chase," he gathered together a group of expatriates - including Cecil Lee, "Horse" Thomson and "Torch" Bennett - to form a group in Kuala Lumpur that would later become a worldwide legacy. The fraternity received its name from the Selangor Club Chambers, which due to its lack lustre food was commonly referred to as the "Hash House."

55. Hashing, MACs, And Digital Signatures In .NET
This article covers what the differences are between hashing, MAC and digital signatures. It presumes a certain level of knowledge about encryption methods
http://dotnetslackers.com/articles/security/Hashing_MACs_and_Digital_Signatures_
  • Forums Community
    • Blogs    Files    ...
      The secret of great code performance?
      Put your powerful brain in contact with ANTS Profiler and witness the reaction. “We improved performance of the application up to 10x” Dan Ports, Intrigma
      Total votes:
      Views:
      Comments:
      Category: Security
      Please login to rate or to leave a comment.
      Hashing, MACs, and Digital Signatures in .NET
      Published: 10 Nov 2006 By: Derek Smyth This article covers what the differences are between hashing, MAC and digital signatures. It presumes a certain level of knowledge about encryption methods especially the difference between symmetric and asymmetric encryption. The article does not cover how to perform encryption or about key management. There are some code examples on how to perform each of the technologies using C# in .NET v2.0.
      Introduction
      This article covers what the differences are between hashing, MAC and digital signatures. It presumes a certain level of knowledge about encryption methods especially the difference between symmetric and asymmetric encryption. The article does not cover how to perform encryption or about key management. There are some code examples on how to perform each of the technologies using C# in .NET v2.0.
      Hashing; as a means to verify data integrity

56. JHavelina Hash House Harriers
Jhavelina Hash House Harriers. A drinking club with a running problem.
http://www.hashingtucson.com/history.htm
Frequently Asked Questions about Hashing in Tucson
Q: What the hell?
A: Yeah, we know. Q: No seriously. What the hell?
A: Oh. We r*n around the streets, alleys and parks of the greater Tucson area in our never-ending quest for beer, good times, and beer. Q: What exactly is hashing ? Why is it called hashing
A: Hashing . . . it's a mixture of athleticism and sociability, hedonism and hard work; a refreshing break from the nine-to-five routine. Hashing is an exhilaratingly fun combination of r*nning, orienteering, and partying, where bands of Harriers and Harriettes chase Hares on 4-6 mile long trails through town, country, jungle, and desert, all in search of exercise, camaraderie, good times and beer. Hashing Hashing died during World War II (Japanese occupying forces being notoriously opposed to civilian fun), but came back to life in the post-war years, spreading slowly through Singapore, Indonesia, Australia, and New Zealand, then exploding in popularity in the late 70s and early 80s. Today there are thousands of Hash House Harrier clubs in all parts of the world, complete with newsletters, directories, and regional and world Hashing conventions. Despite its growth

57. PHP: Hash - Manual
Message Digest (hash) engine. Allows direct or incremental processing of arbitrary length messages using a variety of hashing algorithms.
http://www.php.net/hash
@import url("/styles/site.css"); @import url("/styles/mirror.css"); @import url("/styles/print.css"); downloads documentation faq getting help ... my php.net s earch for in the function list all php.net sites this mirror only online documentation bug database Site News Archive All Changelogs just pear.php.net just pecl.php.net just talks.php.net general mailing list developer mailing list documentation mailing list HaruPage::textRect Last updated: Sun, 25 Nov 2007 view this page in Brazilian Portuguese Chinese (Simplified) Chinese (Hong Kong Cantonese) Chinese (Traditional) Czech Danish Dutch Finnish French German Greek Hebrew Hungarian Italian Japanese Korean Polish Romanian Russian Slovak Spanish Swedish
hash Functions
Introduction
Message Digest (hash) engine. Allows direct or incremental processing of arbitrary length messages using a variety of hashing algorithms.
Requirements
The Hash extension requires no external libraries and is enabled by default as of PHP 5.1.2. It may be explicitly disabled by using the disable-hash switch to configure. Earlier versions of PHP may incorporate the Hash extension by installing the
Resource Types
This extension defines a Hashing Context resource returned by
Predefined Constants
The constants below are defined by this extension, and will only be available when the extension has either been compiled into PHP or dynamically loaded at runtime.

58. Hashing@Everything2.com
The concept of hashing is native to programming, and involves the use of mathematical functions to sort incoming data in a speedy, and organized fashion.
http://www.everything2.com/index.pl?node_id=113973

59. Felgall - What Is Hashing?
What is collision and what are the differences between double hashing, chaining, bucket addressing, perfect hashing, and dynamic hashing?
http://www.felgall.com/hash.htm
Search: pages images
  • Main Your host:
    Stephen Chapman
    What is Hashing?
    Question: I want to know about direct addressing, dictionary lookup, and indirect addressing. Can you explain about division remainder, digit analysis/extraction, folding, mid-square, and radix conversion? What is collision and what are the differences between double hashing, chaining, bucket addressing, perfect hashing, and dynamic hashing? What is linear probing and what are synonyms?
    anonymous Answer: Hash tables are one of the most efficient means of searching for data. A hash table establishes a mapping between all of the possible keys and the position where the data associated with those keys is stored. I don't know exactly how all of the hashing methods that you are asking about work but the following should go at least partway towards answering your questions. Direct Addressing is where the hashing algorithm guarantees that no two keys will generate the exact same hash value. This is the ideal situation but is impractical in most situations. Instead most hash functions map multiple keys to the same has value and provide indirect addressing mechanisms to handle the situation where two keys map to the same value. The situation where this occurs is called a

60. RedHanded » Tell Me The Hashing Dangers
The current symbol hashing system is crazy and produces an awful distribution but looking up the string and hashing that is pretty expensive.
http://redhanded.hobix.com/bits/tellMeTheHashingDangers.html
@import "/site.css"; hoodwink.d enhanced
RSS XHTML
sneaking Ruby through the system 5.gets bits inspect the cult ... -h New to RedHanded? About our sections.
Archive
  • December 2004 January 2005 February 2005 March 2005 ... Programming Ruby
    Links
    @technorati
    @del.icio.us

    @flickr

    @artima
    ...
    ~zenspider
    Syndicate
    Built upon Hobix Got a story for us? E-mail it! Technorati Profile
    Tell Me the Hashing Dangers
    by why in bits class Symbol def hash; to_s.hash; end end Someone explain why not. document.write((new Date(1172599213000)).strftime("%d %b %Y at %H:%M")); 27 Feb 2007 at UTC
    Evan
    said on document.write((new Date(1172600125000)).strftime("%d %b %Y at %H:%M")); 27 Feb 2007 at UTC
    roberthahn
    said on document.write((new Date(1172600472000)).strftime("%d %b %Y at %H:%M")); 27 Feb 2007 at UTC But I have no explanation as to why not. I presume that any answer must explain how that number is created in the first place.
    Peter Cooper
    said on document.write((new Date(1172602166000)).strftime("%d %b %Y at %H:%M")); 27 Feb 2007 at UTC Because Symbol already has a hash method (which returns the same as object_id, granted)?

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 3     41-60 of 75    Back | 1  | 2  | 3  | 4  | Next 20

free hit counter