Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Hash list
Known as:
Hash (computers)
In computer science, a hash list is typically a list of hashes of the data blocks in a file or set of files. Lists of hashes are used for many…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Checksum
Computer science
Cryptographic hash function
Cyclic redundancy check
Expand
Broader (1)
Error detection and correction
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Applying Distributed Ledgers to Manage Workflow Provenance
J. Billings
arXiv.org
2018
Corpus ID: 4887714
Sharing provenance across workflow management systems automatically is not currently possible, but the value of such a capability…
Expand
2015
2015
AGREEABLE PROVABLE DATA POSSESSION FOR INTEGRITY VERIFICATION IN MULTI-CLOUD STORAGE
Sayan Krishna Som
,
Gaurav Chopra
,
S. Joshi
,
Dipanshu Yadav
,
Chandra Sekhar Tyagi
2015
Corpus ID: 56371829
Unique Provable information ownership (PDP) is a system for guaranteeing the Integrity of information away outsourcing. In this…
Expand
2014
2014
Design and Implementation of Binary File Similarity Evaluation System
Sun Jung Kim
,
Y. Yoo
,
J. So
,
Jeong-Gun Lee
,
Jin Kim
,
Y. Ko
International Conference on Multimedia and…
2014
Corpus ID: 44626011
In cloud storage system, when we search similar documentation files, keyword-based similarity evaluation scheme is well performed…
Expand
Review
2014
Review
2014
Contention Management Policy in Software Transactional Memory in Parallel and Distributed Systems
Srikanth Bethu
,
P. Srikanth
,
Md. Asrar Ahmed
Fourth International Conference on Communication…
2014
Corpus ID: 14678772
In Parallel Programming, Transactional memory serves as a better alternative compared to the inherently used lock based…
Expand
2014
2014
An Evaluation of Side-Information Assisted Forensic Hash Matching
Johan Garcia
IEEE 38th International Computer Software and…
2014
Corpus ID: 6961860
Investigations involving digital forensics typically include file hash matching procedures at one or more steps in the…
Expand
2013
2013
Frequent itemsets grouping algorithm based on Hash list
Wang Hongme
2013
Corpus ID: 57362798
Apriori algorithm is a classic algorithm in frequent itemsets mining. In view of the shortcomings of pruning operations and…
Expand
2011
2011
Hash + list Based on the Index of Special-Memory Database System Design and Implementation
Huang Wei
International Conference on Computer and…
2011
Corpus ID: 64019678
This paper study memory database management system of the principles and key technologies,Monitoring system based on mobile…
Expand
2010
2010
Optimal Hash List for Word Frequency Analysis
Sheng-Lan Peng
International Conference on Web Information…
2010
Corpus ID: 18919138
Word frequency analysis plays an essential role in many data mining tasks of large-scale data set based on text corpus, and hash…
Expand
2009
2009
Development of data authenticity verification system in regional health information network
Tian-Shu Zhou
,
Jing-song Li
,
Xiaoguang Zhang
,
Zhen Hu
,
Hai-Yan Yu
,
Huan Chen
IEEE International Symposium on IT in Medicine…
2009
Corpus ID: 24680819
A diverse child nodes hash tree method was proposed to make the digest structure more flexible, improving the data authenticity…
Expand
2004
2004
Study of a hardware Hash list compression method and its performance analysis
Zhang Yong
2004
Corpus ID: 63160377
In high speed and large volume flow of packet classification, hardware Hash table has the advantage of lower cost and better…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE