Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,264,577 papers from all fields of science
Search
Sign In
Create Free Account
Rabin fingerprint
Known as:
Rabin fingerprinting
, Rabin fingerprinting scheme
The Rabin fingerprinting scheme is a method for implementing fingerprints using polynomials over a finite field. It was proposed by Michael O. Rabin.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Cryptographic hash function
Fingerprint (computing)
Hash function
Irreducible polynomial
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Simple Suggestion based on Understanding & Using a Combination of Python based Tools in the Context of Rabin Fingerprint Computing.
N. Kumar
2019
Corpus ID: 208095764
A Simple Suggestion based on Understanding & Using a Combination of Python based Tools in the Context of Rabin Fingerprint…
Expand
2018
2018
Learning to Fingerprint the Latent Structure in Question Articulation
Mrityunjay Kumar
,
G. Ravindra
International Conference on Machine Learning and…
2018
Corpus ID: 52282342
Algorithmic interpretation of question articulation is one of the key steps in a machine-driven question-answering system…
Expand
2015
2015
Topics in combinatorial pattern matching
Hjalte Wedel Vildhøj
2015
Corpus ID: 66934378
This dissertation studies problems in the general theme of combinatorial pattern matching. More specifically, we study the…
Expand
2015
2015
Algorithms and Data Structures for Strings, Points and Integers:or, Points about Strings and Strings about Points
Søren Vind
2015
Corpus ID: 218100010
This dissertation presents our research in the broad area of algorithms and data structures. More specifically, we show solutions…
Expand
2014
2014
Development of a novel method combining multi-wavelength HPLC fingerprint and quantitative analysis of multi-comp onent by single marker for quality control of Houttuynia cordata
Liu Yan
,
Xiong Wei
,
+4 authors
H. Bin
2014
Corpus ID: 49323933
A novel method combining multi-wavelength high-perf ormance liquid chromatographic (HPLC) fingerprints and quantitative analysis…
Expand
2014
2014
Collaborative Anti Spam Technique to Detect Spam Mails in E-Mails
M. Latha
,
Nivedha
,
Menagagandhi
,
Ramya
2014
Corpus ID: 651195
In the field of collaborative spam filtering by nearduplicate detection, an e-mail abstraction scheme is required to more…
Expand
2014
2014
Cloud Computing and an End-System Redundancy Elimination Service for Enterprises
Ganapathi Avabrath
2014
Corpus ID: 18911514
In many enterprises today, WAN optimizers are being deployed in order to eliminate redundancy in network traffic and reduce WAN…
Expand
2013
2013
The Research on Rabin Fingerprint Algorithm Apply to Duplicate Data Detection
Zhong Hong-jun
2013
Corpus ID: 63615936
Rabin fingerprint algorithm is widely used in the field of duplicate data detection with high computational efficiency and good…
Expand
2013
2013
An Efficient Data Deduplication based on Tar-format Awareness in Backup Applications
Baegjae Sung
,
Sejin Park
,
Youngsup Oh
,
Jeonghyeon Ma
,
Unsung Lee
,
Chanik Park
2013
Corpus ID: 14605270
Disk-based backup storage system is utilized widely, and data deduplication is becoming an essential technique in the system…
Expand
2009
2009
A Digest and Pattern Matching-Based Intrusion Detection Engine
Zhongqiang Chen
,
Yuan Zhang
,
Zhongrong Chen
,
A. Delis
Computer/law journal
2009
Corpus ID: 13912841
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE