Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,756,402 papers from all fields of science
Search
Sign In
Create Free Account
Hash list
Known as:
Hash (computers)
In computer science, a hash list is typically a list of hashes of the data blocks in a file or set of files. Lists of hashes are used for many…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Checksum
Computer science
Cryptographic hash function
Cyclic redundancy check
Expand
Broader (1)
Error detection and correction
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Strongly Secure Authenticated Key Exchange from Supersingular Isogeny
Xiu Xu
,
Haiyang Xue
,
Kunpeng Wang
,
Song Tian
,
Bei Liang
,
Wei Yu
IACR Cryptology ePrint Archive
2018
Corpus ID: 267501280
Motivated by the main concern in exploring new techniques to design supersingular isogeny-based authenticated key exchange (AKE…
Expand
2018
2018
Applying Distributed Ledgers to Manage Workflow Provenance
J. Billings
arXiv.org
2018
Corpus ID: 4887714
Sharing provenance across workflow management systems automatically is not currently possible, but the value of such a capability…
Expand
2014
2014
Design and Implementation of Binary File Similarity Evaluation System
Sun Jung Kim
,
Y. Yoo
,
J. So
,
Jeong-Gun Lee
,
Jin Kim
,
Y. Ko
International Conference on Multimedia and…
2014
Corpus ID: 44626011
In cloud storage system, when we search similar documentation files, keyword-based similarity evaluation scheme is well performed…
Expand
Review
2014
Review
2014
Contention Management Policy in Software Transactional Memory in Parallel and Distributed Systems
Srikanth Bethu
,
P. Srikanth
,
Md. Asrar Ahmed
Fourth International Conference on Communication…
2014
Corpus ID: 14678772
In Parallel Programming, Transactional memory serves as a better alternative compared to the inherently used lock based…
Expand
2014
2014
An Evaluation of Side-Information Assisted Forensic Hash Matching
Johan Garcia
IEEE 38th International Computer Software and…
2014
Corpus ID: 6961860
Investigations involving digital forensics typically include file hash matching procedures at one or more steps in the…
Expand
2013
2013
Frequent itemsets grouping algorithm based on Hash list
Wang Hongme
2013
Corpus ID: 57362798
Apriori algorithm is a classic algorithm in frequent itemsets mining. In view of the shortcomings of pruning operations and…
Expand
2012
2012
Performance evaluation of a field programmable gate array-based system for detecting and tracking peer-to-peer protocols on a gigabit ethernet network
Brennon Thomas
2012
Corpus ID: 60188345
Abstract : The TRacking and Analysis for Peer-to-Peer 2 (TRAPP-2) system is developed on a Xilinx ML510 FPGA. The goals of this…
Expand
2011
2011
Hash + list Based on the Index of Special-Memory Database System Design and Implementation
Huang Wei
International Conference on Computer and…
2011
Corpus ID: 64019678
This paper study memory database management system of the principles and key technologies,Monitoring system based on mobile…
Expand
2010
2010
Optimal Hash List for Word Frequency Analysis
Sheng-Lan Peng
International Conference on Web Information…
2010
Corpus ID: 18919138
Word frequency analysis plays an essential role in many data mining tasks of large-scale data set based on text corpus, and hash…
Expand
2004
2004
Study of a hardware Hash list compression method and its performance analysis
Zhang Yong
2004
Corpus ID: 63160377
In high speed and large volume flow of packet classification, hardware Hash table has the advantage of lower cost and better…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE