Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,974,590 papers from all fields of science
Search
Sign In
Create Free Account
Hash list
Known as:
Hash (computers)
In computer science, a hash list is typically a list of hashes of the data blocks in a file or set of files. Lists of hashes are used for many…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Checksum
Computer science
Cryptographic hash function
Cyclic redundancy check
Expand
Broader (1)
Error detection and correction
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Applying Distributed Ledgers to Manage Workflow Provenance
J. Billings
arXiv.org
2018
Corpus ID: 4887714
Sharing provenance across workflow management systems automatically is not currently possible, but the value of such a capability…
Expand
2015
2015
AGREEABLE PROVABLE DATA POSSESSION FOR INTEGRITY VERIFICATION IN MULTI-CLOUD STORAGE
S. Som
,
Gaurav Chopra
,
S. Joshi
,
Dipanshu Yadav
,
Chandra Sekhar Tyagi
2015
Corpus ID: 56371829
Unique Provable information ownership (PDP) is a system for guaranteeing the Integrity of information away outsourcing. In this…
Expand
2015
2015
Stream table creating and querying method
何三波
2015
Corpus ID: 140242298
The invention relates to a data packet forwarding control technology of data communication field, and discloses a stream table…
Expand
2014
2014
Android system security verification method and verification device thereof
陈勇
2014
Corpus ID: 201138081
The invention provides an Android system security verification method used on a terminal and a verification device thereof…
Expand
2013
2013
Frequent itemsets grouping algorithm based on Hash list: Frequent itemsets grouping algorithm based on Hash list
Hong-Mei Wang
,
Ming Hu
2013
Corpus ID: 62391566
2012
2012
Performance evaluation of a field programmable gate array-based system for detecting and tracking peer-to-peer protocols on a gigabit ethernet network
Brennon Thomas
2012
Corpus ID: 60188345
Abstract : The TRacking and Analysis for Peer-to-Peer 2 (TRAPP-2) system is developed on a Xilinx ML510 FPGA. The goals of this…
Expand
2011
2011
Hash + list Based on the Index of Special-Memory Database System Design and Implementation
Huang Wei
International Conference on Computer and…
2011
Corpus ID: 64019678
This paper study memory database management system of the principles and key technologies,Monitoring system based on mobile…
Expand
2011
2011
Chapter 1 AN FPGA-BASED SYSTEM FOR DETECTING MALICIOUS DNS NETWORK TRAFFIC
Brennon Thomas
,
B. Mullins
,
Gilbert L. Peterson
,
R. Mills
2011
Corpus ID: 17611082
Billions of packets traverse computer networks every day. Often, these packets have legitimate destinations such as buying a book…
Expand
2010
2010
Optimal Hash List for Word Frequency Analysis
Shengbo Peng
International Conference on Web Information…
2010
Corpus ID: 18919138
Word frequency analysis plays an essential role in many data mining tasks of large-scale data set based on text corpus, and hash…
Expand
2004
2004
Study of a hardware Hash list compression method and its performance analysis
Zhang Yong
2004
Corpus ID: 63160377
In high speed and large volume flow of packet classification, hardware Hash table has the advantage of lower cost and better…
Expand