Login / Signup
Hardware-based hash functions for network applications.
Fumito Yamaguchi
Hiroaki Nishi
Published in:
ICON (2013)
Keyphrases
</>
hash functions
peer to peer
order preserving
network structure
real time
locality sensitive
similarity search
abstraction layer
decision trees
feature extraction
pattern recognition
low cost
data management
block cipher
minimal perfect hash functions