e99 Online Shopping Mall
Help | |
Home - Sports - Hashing (Books) |
  | Back | 41-60 of 72 | Next 20 |
click price to see details click image to enlarge click link to go to the store
41. Hashing moving objects (Computer science technical report series CS-TR) by Zhexuan Song | |
Unknown Binding: 31
Pages
(2000)
Asin: B0006RTH60 Canada | United Kingdom | Germany | France | Japan | |
42. Hashing: Masters for making overhead slides (OSU-CS-TR) by George E Hedrick | |
Unknown Binding:
Pages
(1995)
Asin: B0006QNHAI Canada | United Kingdom | Germany | France | Japan | |
43. Robin Hood hashing (Research report. University of Waterloo. Department of Computer Science) by Pedro Celis | |
Unknown Binding: 68
Pages
(1986)
Asin: B0007B71KY Canada | United Kingdom | Germany | France | Japan | |
44. Relative prime transformation aids the minimal perfect hashing function by Celestina T Fung | |
Unknown Binding:
Pages
(1986)
Asin: B0007BDEU0 Canada | United Kingdom | Germany | France | Japan | |
45. Dynamic file organizations for partial match retrieval based on linear hashing (Technical report. University of Minnesota. Institute of Technology. Computer Science Dept) by T. S Yuen | |
Unknown Binding: 33
Pages
(1985)
Asin: B00071FYLW Canada | United Kingdom | Germany | France | Japan | |
46. A general purpose scatter storage subsystem and a comparison of hashing methods (SuDoc NAS 1.26:175814) by Steven C. Macy | |
Unknown Binding:
Pages
(1984)
Asin: B00010KTLE Canada | United Kingdom | Germany | France | Japan | |
47. Searching on alphanumeric keys using local balanced trie hashing (Technical report. Carleton University. School of Computer Science) by Ekow J Otoo | |
Unknown Binding: 36
Pages
(1987)
Asin: B0007BQDS0 Canada | United Kingdom | Germany | France | Japan | |
48. Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers (Lecture Notes in Computer Science) | |
Paperback: 245
Pages
(2002-06-10)
list price: US$99.00 -- used & new: US$78.70 (price subject to change: see help) Asin: 3540436774 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
49. String Processing and Information Retrieval: 16th International Symposium, SPIRE 2009 Saariselkä, Finland, August 25-27, 2009 Proceedings (Lecture Notes ... Computer Science and General Issues) | |
Paperback: 354
Pages
(2009-09-18)
list price: US$79.95 -- used & new: US$42.01 (price subject to change: see help) Asin: 3642037836 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description This book constitutes the refereed proceedings of the 16th String Processing and Information Retrieval Symposium, SPIRE 2009 held in Saariselkä, Finland in August 2009. The 34 revised full papers were carefully reviewed and selected from 84 submissions. The papers are organized in topical sections on algorithms on trees, compressed indexes, compression, indexing, content analysis, string algorithms and bioinformatics, string algorithms and theory, and using and understanding usage. |
50. Cryptographic Libraries for Developers (Programming Series) by Ed Moyle, Diana Kelley | |
Paperback: 464
Pages
(2005-12-15)
list price: US$49.95 -- used & new: US$11.94 (price subject to change: see help) Asin: 1584504099 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description No longer is it an option for software to include cryptography; everyone from office suites to accounting software and eCommerce Web sites use it. So today’s developers have to know how to write software that includes cryptographic functionality. Although they are usually familiar with the basics of cryptography, they are not always familiar enough with the available products to select the right API/library and get up and running with it quickly.Cryptographic Libraries for Developers teaches developers about the available APIs and helps them select the right ones for their projects based on platform, language, and regulatory requirements. The book serves as a nuts and bolts guide to writing software using these libraries and provides abundant examples and detailed examples throughout. The libraries covered include OpenSSL, B/Safe, the Java Cryptographic Library (JCE,) as sign/verify, encrypt/decrypt (asymmetric and symmetric,) MACs, and Hashing, as well as higher-level primitives such as X.509 digital certificates and secure (SSL) communications. Key Features:• Provides a practical guide that teaches developers how to rapidly write and del=ploy applications requiring cryptography• Covers the five common cryptography libraries: OpenSSL, B/Safe, the Java Cryptographic Library (JCE), and CAPI• Teaches developers how to write security features for commercial software• Includes a CD-ROM with all of the features and source code from the book On the CD!• Code Snippets: The snippets of examples source code used throughout this book are included on this CD-ROM within their broader context• Example Applications: Example frameworks and applications developed using the techniques, libraries, and strategies described within this book. Included as well are any and all design diagrams used in the preparation of the examples System RequirementsWindows: Microsoft Windows NT 4.0 Sp6, Microsoft Windows XP Professional or Home, of 2003 Server, 256MB RAM, 20MB fixed storage (required for compilation of samples), a compiler and/or development environment corresponding to the samples you wish to utilize. For example, Microsoft Visual Studio, Visual C++, Sun’s Java 2 Platform Standard Edition (i.e., the JDK), etc.UNIX: A POSIX-compliant operating system such as Solaris, Linux, BSD, HPUX, True-64, AIX, etc.; 10MB fixed storage (repaired for compilation of samples, a compiler and/or development environment corresponding to the samples you wish to utilize. For example, gcc/g++, Sun’s Java 2 Platform Standard Edition (i.e., the JDK), etc. OPTIONAL: To compile C/C++ software, the "make" utility greatly increases the efficiency of the compilation process. Customer Reviews (3)
How to write and deploy cryotography applications
Fills a needed niche, but lacks details for the curious
Making an Impossible Task Manageable |
51. Graph-Based Representations in Pattern Recognition: 7th IAPR-TC-15 International Workshop, GbRPR 2009, Venice, Italy, May 26-28, 2009. Proceedings (Lecture ... Vision, Pattern Recognition, and Graphics) | |
Paperback: 378
Pages
(2009-06-18)
list price: US$79.95 -- used & new: US$62.11 (price subject to change: see help) Asin: 3642021239 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description This book constitutes the refereed proceedings of the 7th IAPR-TC-15 International Workshop on Graph-Based Representations in Pattern Recognition, GbRPR 2009, held in Venice, Italy in May 2009. The 37 revised full papers presented were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on graph-based representation and recognition, graph matching, graph clustering and classification, pyramids, combinatorial maps, and homologies, as well as graph-based segmentation. |
52. Unique file identification in the National Software Reference Library [An article from: Digital Investigation] by S. Mead | |
Digital:
Pages
(2006-09-01)
list price: US$10.95 -- used & new: US$10.95 (price subject to change: see help) Asin: B000PBZT0K Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
53. Accurate discovery of co-derivative documents via duplicate text detection [An article from: Information Systems] by Y. Bernstein, J. Zobel | |
Digital: 14
Pages
(2006-11-01)
list price: US$10.95 -- used & new: US$10.95 (price subject to change: see help) Asin: B000P6OOZG Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
54. Searching algorithms (Teubner-Texte zur Mathematik) by J Wiedermann | |
Paperback: 123
Pages
(1987)
Isbn: 3322004333 Canada | United Kingdom | Germany | France | Japan | |
55. Using hash functions as a hedge against chosen ciphertext attack (Research report / International Business Machines Corporation. Research Division) by Victor Shoup | |
Unknown Binding: 12
Pages
(1999)
Asin: B0006RB5MY Canada | United Kingdom | Germany | France | Japan | |
56. A lexical analogy to feature matching and pose estimation (SuDoc C 13.58:6790) by John Albert Horst | |
Unknown Binding:
Pages
(2002)
Asin: B000116N9A Canada | United Kingdom | Germany | France | Japan | |
57. Hash tables in PRAM and VLSI models (Technical report / Dipartimento di informatica, Università di Pisa) by Fabrizio Luccio | |
Unknown Binding: 7
Pages
(1989)
Asin: B0007BOOHC Canada | United Kingdom | Germany | France | Japan | |
58. Parallel access to hash tables (Technical report / Dipartimento di informatica, Università di Pisa) by Fabrizio Luccio | |
Unknown Binding: 10
Pages
(1989)
Asin: B0007BOOF4 Canada | United Kingdom | Germany | France | Japan | |
59. A new method for generating minimal perfect hash functions by Thomas J Sager | |
Unknown Binding:
Pages
(1984)
Asin: B00071MRJY Canada | United Kingdom | Germany | France | Japan | |
60. Rationale for bit fixing in the MDC-2 algorithm (Research report RC. International Business Machines Corporation. Research Division) by Don Coppersmith | |
Unknown Binding: 7
Pages
(1999)
Asin: B0006R8A1S Canada | United Kingdom | Germany | France | Japan | |
  | Back | 41-60 of 72 | Next 20 |