Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality function » functionals function, functionaries function, functional functions
hash functionality » hand functionality, high functionality, paste functionality
processing hash » processing has, processing phase, processing high
function https » functions https, fiction https
functionality function » functionals function, functionaries function, functional functions
hash functionality » hand functionality, high functionality, paste functionality
processing hash » processing has, processing phase, processing high
function https » functions https, fiction https
1
Published 2005
Table of Contents:
“...: Extending the Recovery Algorithm -- Hash Functions for Datatype Signatures in MPI -- Extensions...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“...String Processing and Information Retrieval 2005 -- Enhanced Byte Codes with Restricted Prefix...”View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“... -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects...”View full text
Electronic
eBook
4
Published 2013
Table of Contents:
“... of Temporal Data -- Fast Approximation Method for Gaussian Process Regression Using Hash Function for Non...”View full text
Electronic
eBook
5
Published 2012
Table of Contents:
“...-Based Matching of Large Ontologies Using Locality-Sensitive Hashing -- Automatic Typing of DBpedia...”View full text
Electronic
eBook
6
Published 2012
Table of Contents:
“...-Based Matching of Large Ontologies Using Locality-Sensitive Hashing -- Automatic Typing of DBpedia...”View full text
Electronic
eBook
7
Published 2011
Table of Contents:
“... Algorithms -- 4 Parallel Sorting – The Need for Speed -- 5 Topological Sorting – How Should I Begin...”View full text
Electronic
eBook
8
Published 2014
Table of Contents:
“... by Phase Tracking using Bilateral Probability Function -- Electrical Network Modeling of Amino Acid String...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“... -- Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers -- On Differential and Linear...”View full text
Electronic
eBook
10
Published 2008
Table of Contents:
“... of Trivium -- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical...”View full text
Electronic
eBook
11
Computing with New Resources Essays Dedicated to Jozef Gruska on the Occasion of His 80th Birthday /
Published 2014
Table of Contents:
“... -- Computing Boolean Functions via Quantum Hashing -- Complexity of Promise Problems on Classical and Quantum...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... of Reconfigurable Hardware for Accelerated Parallel Processing -- Routing-Aware Application Mapping Considering...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... on Symmetry and Diameter -- Graph Partitioning Strategies for Efficient BFS in Shared-Nothing Parallel Systems...”View full text
Electronic
eBook
14
Published 2006
Table of Contents:
“... for Algebraic and Fast Algebraic Attacks -- Hash Functions -- VSH, an Efficient and Provable Collision-Resistant...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“... Steiner Tree Computation in Polynomial-Space -- Fitting a Step Function to a Point Set -- Faster Swap Edge...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... -- Client-Friendly Classification over Random Hyperplane Hashes -- Large-Scale Clustering through Functional...”View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“... Quality Estimation -- Quasigroup String Transformations and Hash Function Design -- Performances of Error...”View full text
Electronic
eBook
18
Published 2006
Table of Contents:
“... for Axis-Parallel Rectangles -- Single Machine Precedence Constrained Scheduling Is a Vertex Cover Problem...”View full text
Electronic
eBook
19
Published 2006
Table of Contents:
“... to Algebraic Attacks on Stream Ciphers -- On the Non-linearity and Sparsity of Boolean Functions Related...”View full text
Electronic
eBook



