Geometry.Net - the online learning center
Home  - Sports - Hashing
e99.com Bookstore
  
Images 
Newsgroups
Page 1     1-20 of 168    1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hashing:     more books (72)
  1. Design of Hashing Algorithms (Lecture Notes in Computer Science) by Josef Pieprzyk, Babak Sadeghiyan, 1994-01-07
  2. Design and Analysis of Coalesced Hashing (International Monographs on Computer Science) by Jeffrey Scott Vitter, Wen-chin Chen, 1986-10-16
  3. Half a Mind: Hashing : The Outrageous Running Sport by Alice Johnson, 1990-04
  4. Hashing in Smalltalk: Theory and Practice by Andres Valloud, 2008
  5. Hashing in Computer Science: Fifty Years of Slicing and Dicing by Alan G. Konheim, 2010-07-06
  6. Hashing: Hash table, HMAC, Collision, Rabin-Karp string search algorithm, Bloom filter, Cryptographic hash function, Extendible hashing
  7. Half a Mind: Hashing [Signed By Author] by Alice A. Johnson, 1990
  8. Hash Functions: Hash function, Pearson hashing, Rolling hash, Perfect hash function, Fowler-Noll-Vo hash function, Zobrist hashing
  9. Hashing, Searching, Sketching by Rina Panigrahy, 2009-09-18
  10. Data Structure Introduction: Splay Tree, Sparse Array, Extendible Hashing, Pairing Heap, Skew Heap, Search Data Structure, Finger Tree
  11. Things of Each Possible Relation Hashing Against One Another by Juliana Spahr, 2003-11
  12. md5bloom: Forensic filesystem hashing revisited [An article from: Digital Investigation] by V. Roussev, Y. Chen, et all 2006-09-01
  13. Hashing in Smalltalk: Theory and Practice by Andres Valloud, 2008-01-01
  14. Hashing Out Encryption Solutions.: An article from: Security Management by John N. Bumgarner, 2001-06-01

1. Hashing
whatis.com searchDatabase.com Definitions hashing, Search whatis.comfor - OR - Search this site hashing, The term you selected
http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci212230,00.html
whatis.com: searchDatabase.com Definitions - hashing EMAIL THIS PAGE TO A FRIEND searchDatabase.com Definitions - powered by whatis.com BROWSE WHATIS.COM DEFINITIONS: A B C D ... BROWSE ALL CATEGORIES Search whatis.com for: - OR - Search this site:
hashing
The term you selected is being presented by searchDatabase.com, a TechTarget site for Database professionals. Hashing is the transformation of a string of character s into a usually shorter fixed-length value or key that represents the original string. Hashing is used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value. It is also used in many encryption algorithms. As a simple example of the using of hashing in databases, a group of people could be arranged in a database like this: Abernathy, Sara Epperdingle, Roscoe Moore, Wilfred Smith, David (and many more sorted into alphabetical order) Each of these names would be the key in the database for that person's data. A database search mechanism would first have to start looking character-by-character across the name for matches until it found the match (or ruled the other entries out). But if each of the names were hashed, it might be possible (depending on the number of names in the database) to generate a unique four-digit key for each name. For example: 7864 Abernathy, Sara 9802 Epperdingle, Roscoe 1990 Moore, Wilfred 8822 Smith, David (and so forth)

2. What Is Hashing? - A Word Definition From The Webopedia Computer Dictionary
This page describes the term hashing and lists other pages on the Web where you can find additional information. probability that the message was transmitted intact. hashing is also a common method of accessing data records For internet.com pages about hashing . Also check out the following
http://www.webopedia.com/TERM/h/hashing.html
You are in the: Small Business Channel Jump to Website ECommerce Guide Small Business Computing Webopedia WinPlanet Enter a word for a definition... ...or choose a computer category. choose one... All Categories Communications Computer Industry Companies Computer Science Data Graphics Hardware Internet and Online Services Mobile Computing Multimedia Networks Open Source Operating Systems Programming Software Standards Types of Computers Wireless Computing World Wide Web Home
Term of the Day

New Terms

New Links
...
Be a Commerce Partner

hashing Last modified: Tuesday, October 14, 2003 Producing hash values for accessing data or for security . A hash value (or simply hash ), also called a message digest , is a number generated from a string of text. The hash is substantially smaller than the text itself, and is generated by a formula in such a way that it is extremely unlikely that some other text will produce the same hash value. Hashes play a role in security systems where they're used to ensure that transmitted messages have not been tampered with. The sender generates a hash of the message, encrypts it, and sends it with the message itself. The recipient then decrypts both the message and the hash, produces another hash from the received message, and compares the two hashes. If they're the same, there is a very high probability that the message was transmitted intact.

3. Hashing
A small paper that explains how hashing works with examples in Pascal. home hashing. hashing. V 0.1. hashing is a method to store data in an array so that storing
http://www.palfrader.org/hashing
home Hashing
Hashing
V 0.1 Hashing is a method to store data in an array so that storing, searching, inserting and deleting data is fast (in theory it's O(1)). For this every record needs an unique key. The basic idea is not to search for the correct position of a record with comparisons but to compute the position within the array. The function that returns the position is called the 'hash function' and the array is called a 'hash table'. In our examples our key is an integer value as is the actual data. [note that I use pascal syntax since this is easily readable by everybody I asume] type record key integer data integer end the hash table now looks like this: const type array of If we know that the key is in a small range we could use the key itself as an index (also called hash address) for our array. However this is very rarely the case so we have to find some kind of hash function. A very common and not so bad function is a simple MODulo function: function key integer integer begin key MOD end If we now want to insert a record into the hash we could do it this way: procedure VAR hash rec begin hash rec key rec end But wait! What happens if two different keys return the same hash address from the hash function? Well if you have a good hash function this happens very rarely but it can and will happen. There are two ways to handle a so called 'hash collision'.

4. The Whirlpool Hash Function
A 512bit hashing function, submitted to NESSIE and selected as finalist. Now also proposed for inclusion in the ISO 10118-3 standard (revision).
http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html
The W HIRLPOOL Hash Function
M51 (Whirlpool) Galaxy in Canes Venatici. Image courtesy of William McLaughlin
Welcome!
    W HIRLPOOL is a hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto that operates on messages less than 2 bits in length, and produces a message digest of 512 bits.
    W HIRLPOOL has been selected for the NESSIE portfolio of cryptographic primitives . The International Organization for Standardization ( ISO ) has decided to include the final version of W HIRLPOOL in the revised ISO/IEC 10118-3:2003(E) standard.
    The function
    W HIRLPOOL W . This consists of the following. The bit string to be hashed is padded with a '1'-bit, then with a sequence of '0'-bits, and finally with the original length (in the form of a 256-bit integer value), so that the length after padding is a multiple of 512 bits. The resulting message string is divided into a sequence of 512-bit blocks m , m , ... m t which is then used to generate a sequence of intermediate hash values H , H , H , ... H t . By definition, H is a string of 512 '0'-bits. To compute

5. The Guide To Hashing In Korea, Hash House Harriers
History of hashing in South Korea, with links to all South Korean kennels of the Hash House Harriers.
http://gotothehash.net/korea.html

Korean H3 Lineage

World Hash Links

Internet Hoax Links
International Weather ...
Seoul Now

Get FREE E-mail here:

Beer.com

Excite Mail

Hotmail

Mail City
...
Yahoo Mail
Visitors since 12/97 FastCounter by bCentral H3 Pages in Korea
Busan H3 Koje H3 Korea Mystery H3 Mipo H3 ... Former Hashers of Korea - In Transit
Read the feature article from the Korea Herald This page last updated 20 February 2004 Guide to Hashing in Korea name="Webmaster" at=""@ domain="gotothehash.net" document.write(""+name+""+at+""+domain+"")

6. MD5 Hashing Class/Utility
Computes the MD5 hash of arrays of bytes. Can also be used in commandline mode. Open Source, Public Domain
http://www.jonh.net/~jonh/md5/MD5.java
import java.io.*; import java.net.*; import java.util.*; import java.math.*; // This class computes MD5 hashes. // Manually translated by Jon Howell

7. RFC 2104 (rfc2104) - HMAC: Keyed-Hashing For Message Authentication
HMAC Keyedhashing for Message Authentication. H. Krawczyk, M. Bellare, R. Canetti. February 1997.
http://www.faqs.org/rfcs/rfc2104.html
RFC 2104 (RFC2104)
Internet RFC/STD/FYI/BCP Archives RFC Index RFC Search Usenet FAQs Web FAQs ... Cities Alternate Formats: rfc2104.txt rfc2104.txt.pdf
RFC 2104 - HMAC: Keyed-Hashing for Message Authentication
RFC 1826 , August 1995. [BCK1] M. Bellare, R. Canetti, and H. Krawczyk, "Keyed Hash Functions and Message Authentication", Proceedings of Crypto'96, LNCS 1109, pp. 1-15. ( http://www.research.ibm.com/security/keyed-md5.html ) [BCK2] M. Bellare, R. Canetti, and H. Krawczyk, "Pseudorandom Functions Revisited: The Cascade Construction", Proceedings of FOCS'96. [Dobb] H. Dobbertin, "The Status of MD5 After a Recent Attack", RSA Labs' CryptoBytes, Vol. 2 No. 2, Summer 1996. http://www.rsa.com/rsalabs/pubs/cryptobytes.html [PV] B. Preneel and P. van Oorschot, "Building fast MACs from hash functions", Advances in Cryptology CRYPTO'95 Proceedings, Lecture Notes in Computer Science, Springer-Verlag Vol.963, 1995, pp. 1-14. [MD5] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321 , April 1992. [MM] Meyer, S. and Matyas, S.M., Cryptography, New York Wiley, 1982. [RIPEMD] H. Dobbertin, A. Bosselaers, and B. Preneel, "RIPEMD-160: A strengthened version of RIPEMD", Fast Software Encryption, LNCS Vol 1039, pp. 71-82.

8. Hashing (11)
hashing (11) Michael L. Littman Problem with Delete. Linear Probing. Double hashing. Example. HASH FUNCTIONS
http://www.cs.duke.edu/~mlittman/courses/Archive/cps130-97/lectures/lect11/lect1
Hashing (11)
Michael L. Littman October 16th, 1997

9. Interhash Goa 2002
Interhash is the Olympics of hashing, held every two years and attended by thousands of Hashers from around the world. Goa, India hosts in 2002.
http://www.goa2002.com/
window.resizeTo( 890,960 ); location.href = "welcome.html";

10. Hash House Harrier Information
Historical Information on the Hash House Harriers, compiled from various sources. A Hash Primer. HalfMind hashing Dictionary. Mystique of the Hash hashing, as we know it today, began in Kuala Lumpur, Malaysia, in 1938, when a group of restive British
http://www.half-mind.com/who.htm
Navigating this site requires JavaScript. Use the Sitemap
Half-Minds
on Hashing
Contents
Harrier Net is also an excellent source of information on hashing.
A Hash Primer
Hashing . . . it's a mixture of athleticism and sociability, hedonism and hard work; a refreshing break from the nine-to-five routine. Hashing is an exhilaratingly fun combination of running, orienteering, and partying, where bands of harriers and harriettes chase hares on eight-to-ten kilometer-long trails through town, country, jungle, and desert, all in search of exercise, camaraderie, and good times. aka the "Hash House." Hash House Harrier runs were patterned after the traditional British public school paper chase. A "hare" would be given a short head start to blaze a trail, marking his devious way with shreds of paper, soon to be pursued by a shouting pack of "harriers." Only the hare knew where he was going . . . the harriers followed his marks to stay on trail. Apart from the excitement of chasing down the wily hare, solving the hare's marks and reaching the end was its own reward, for there, thirsty harriers would find a tub of iced-down beer. Hashing died during World War II (Japanese occupying forces being notoriously opposed to civilian fun), but came back to life in the post-war years, spreading slowly through Singapore, Indonesia, Australia, and New Zealand, then exploding in popularity in the late 70s and early 80s. Today there are thousands of Hash House Harrier clubs in all parts of the world, complete with newsletters, directories, and regional and world hashing conventions.

11. Hash House Harrier Information
on hashing. Contents. Elements of hashing. Basically a hash consists of threemain parts, none of which have anything to do with the marijuana or hashish
http://www.half-mind.com/Hashing/who.htm
Navigating this site requires JavaScript. Use the Sitemap
Half-Minds
on Hashing
Contents
Harrier Net is also an excellent source of information on hashing.
A Hash Primer
Hashing . . . it's a mixture of athleticism and sociability, hedonism and hard work; a refreshing break from the nine-to-five routine. Hashing is an exhilaratingly fun combination of running, orienteering, and partying, where bands of harriers and harriettes chase hares on eight-to-ten kilometer-long trails through town, country, jungle, and desert, all in search of exercise, camaraderie, and good times. aka the "Hash House." Hash House Harrier runs were patterned after the traditional British public school paper chase. A "hare" would be given a short head start to blaze a trail, marking his devious way with shreds of paper, soon to be pursued by a shouting pack of "harriers." Only the hare knew where he was going . . . the harriers followed his marks to stay on trail. Apart from the excitement of chasing down the wily hare, solving the hare's marks and reaching the end was its own reward, for there, thirsty harriers would find a tub of iced-down beer. Hashing died during World War II (Japanese occupying forces being notoriously opposed to civilian fun), but came back to life in the post-war years, spreading slowly through Singapore, Indonesia, Australia, and New Zealand, then exploding in popularity in the late 70s and early 80s. Today there are thousands of Hash House Harrier clubs in all parts of the world, complete with newsletters, directories, and regional and world hashing conventions.

12. Hash - A Whatis Definition - See Also: Hashing, Hash Function
hashing is the transformation of a string of character s into a usually shorterfixedlength value or key that represents the original string.
http://www.whatis.com/definition/0,289893,sid9_gci212230,00.html
Search our IT-specific encyclopedia for: or jump to a topic: Choose a topic... CIO CRM Databases Domino Enterprise Linux Exchange IBM S/390 IBM AS/400 Mobile Computing Networking Oracle SAP Security Storage Visual Basic Web Services Windows 2000 Advanced Search Browse alphabetically:
A
B C D ... Database hashing
Hashing is the transformation of a string of character s into a usually shorter fixed-length value or key that represents the original string. Hashing is used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value. It is also used in many encryption algorithms. As a simple example of the using of hashing in databases, a group of people could be arranged in a database like this: Abernathy, Sara Epperdingle, Roscoe Moore, Wilfred Smith, David (and many more sorted into alphabetical order) Each of these names would be the key in the database for that person's data. A database search mechanism would first have to start looking character-by-character across the name for matches until it found the match (or ruled the other entries out). But if each of the names were hashed, it might be possible (depending on the number of names in the database) to generate a unique four-digit key for each name. For example: 7864 Abernathy, Sara 9802 Epperdingle, Roscoe 1990 Moore, Wilfred 8822 Smith, David (and so forth)

13. New Page 1
hashing in Seoul since 1987. Site includes schedule, contacts, photos, announcements, and instructions for joining the club's email list.
http://www.ykhhh.5u.com/index.html
This page uses frames, but your browser doesn't support them.

14. Web Caching With Consistent Hashing
Web Caching with Consistent hashing. 2 Consistent hashing. Our systemis based on consistent hashing, a scheme developed in a previous
http://www8.org/w8-papers/2a-webserver/caching/paper2.html
Web Caching with Consistent Hashing
by David Karger Alex Sherman Andy Berkheimer, Bill Bogstad, Rizwan Dhanidina Ken Iwamoto, Brian Kim, Luke Matkins, Yoav Yerushalmi. MIT Laboratory for Computer Science
Abstract:
A key performance measure for the World Wide Web is the speed with which content is served to users. As traffic on the Web increases, users are faced with increasing delays and failures in data delivery. Web caching is one of the key strategies that has been explored to improve performance. An important issue in many caching systems is how to decide what is cached where at any given time. Solutions have included multicast queries and directory schemes. In this paper, we offer a new web caching strategy based on consistent hashing. Consistent hashing provides an alternative to multicast and directory schemes, and has several other advantages in load balancing and fault tolerance. Its performance was analyzed theoretically in previous work; in this paper we describe the implementation of a consistent-hashing based system and experiments that support our thesis that it can provide performance improvements.
Keywords:
Caching Hashing Consistent
  • Introduction
    1 Introduction
    As the World Wide Web becomes a dominant medium for information distribution, mechanisms for delivering web traffic efficiently and reliably are needed. However, today's data delivery methods are prone to unpredictable delays and frequent failures. Two main of these delays and failures are congested networks and swamped servers. Date travels slowly through congested networks. Swamped servers (facing more simultaneous requests than their resources can support) will either refuse to serve certain requests or will serve them very slowly. Network congestion and server swamping are common because network and server infrastructure expansions has not kept pace with the tremendous growth in Internet use.

15. Hashing
Running/Jogging. hashing. Guide picks. hashing is an exhilaratingly fun combination of running, orienteering, and partying
http://running.about.com/cs/hashing
About Running / Jogging Clubs and Teams Home ... How to Prepare For Your First Race zau(256,152,145,'gob','http://z.about.com/5/ad/go.htm?gs='+gs,''); Beginning Running Apparel and More Bookshelf Ladies Only ... Help zau(256,138,125,'el','http://z.about.com/0/ip/417/0.htm','');w(xb+xb);
Stay Current
Subscribe to the About Running / Jogging newsletter. Search Running / Jogging
Hashing
Hashing is an exhilaratingly fun combination of running, orienteering, and partying. For drinkers with a running problem!
Alphabetical
Recent Up a category Flying Booger's Half-Mind Catalog ... Hash Boy Hashing comics from Pinky's Home Page. Shooter Recipe List From the Mosquito County HHH a listing of 69 Shooter Recipes. What do we do at the Hash? The Kalahari 3H gives us a down to earth explanation about but really goes on at a Hash. Why did I even ask? Topic Index email to a friend back to top Our Story ...
User Agreement

16. Perfect Hashing
Minimal Perfect hashing. Perfect hashing guarantees that you get nocollisions at all. It Pointers to NonBob perfect hashing. Pointers
http://burtleburtle.net/bob/hash/perfect.html
Minimal Perfect Hashing
Perfect hashing guarantees that you get no collisions at all. It is possible when you know exactly what set of keys you are going to be hashing when you design your hash function. It's popular for hashing keywords for compilers. (They ought to be popular for optimizing switch statements Minimal perfect hashing guarantees that n keys will map to 0..n-1 with no collisions at all.
C code and a sanity test
Here is my C code for minimal perfect hashing, plus a test case. Makefile standard.h recycle.h recycle.c ... sanity test makefile The generator is run like so, " ", and it produces the C files phash.h and phash.c . The sanity test program, which uses the generated hash to hash all the original keys, is run like so, "
Usage
There are options (taken by both perfect and the sanity test): Only one of NnIiHhAa may be specified. N is the default. These say how to interpret the keys. The input is always a list of keys, one key per line.
N,n

17. Running & Jogging For Recreation And Sport - Exercise - Weight Loss
Guide offers regular features, forums and chat as well as nearly 500 tested links to training tips, running gear, hashing, trail running, youth, masters, for the ladies, and ultra running.
http://running.about.com/
About Running / Jogging Home Essentials ... How to Prepare For Your First Race zau(256,152,145,'gob','http://z.about.com/5/ad/go.htm?gs='+gs,''); Beginning Running Apparel and More Bookshelf Ladies Only ... Help zau(256,138,125,'el','http://z.about.com/0/ip/417/0.htm','');w(xb+xb);
Stay Current
Subscribe to the About Running / Jogging newsletter. Search Running / Jogging From Thomas Woodrow
Your Guide to Running / Jogging
The Eight Day Blitz

When your schedule doesn't allow for running reasonable distances what do you do? Well, I just start running not so reasonable distances. Like one(1) mile at a time. The only difference is I do it two and, sometimes, three times a day. Add several sets of sit-ups and leg lowers to your multiple single miles and you get a fair workout on a day when you probably wouldn't have done anything at all!
Saturday May 22, 2004
I think I've caught it!
The "running bug" that is. I ran my first 5K on Saturday, with a time of 27:53 and I placed 7/22 for my age group (female 20-29). All of my practice 3m runs had been ~28:30, and I told myself I would be happy with anything under 28:00. I was very happy with the results (although I did go out too fast!). The next day I signed up for that 10K I mentioned last time, now two weeks away, and I am already thinking ahead to running a half-marathon in October. - Kim

18. A Hash Function For Hash Table Lookup
If you are hashing n strings (ub1 **)k, do it like this for (i=0, h=0; i slip through sanity checks, like hashing an English dictionary uniformly, while still
http://www.burtleburtle.net/bob/hash/doobs.html
Abstract
I offer you a new hash function for hash table lookup that is faster and more thorough than the one you are using now. I also give you a way to verify that it is more thorough.
The Hash
Over the past two years I've built a general hash function for hash table lookup. Most of the two dozen old hashes I've replaced have had owners who wouldn't accept a new hash unless it was a plug-in replacement for their old hash, and was demonstrably better than the old hash. These old hashes defined my requirements:
  • The keys are unaligned variable-length byte arrays.
  • Sometimes keys are several such arrays.
  • Sometimes a set of independent hash functions were required.
  • Average key lengths ranged from 8 bytes to 200 bytes.
  • Keys might be character strings, numbers, bit-arrays, or weirder things.
  • Table sizes could be anything, including powers of 2.
  • The hash must be faster than the old one.
  • The hash must do a good job.
Without further ado, here's the fastest hash I've been able to design that meets all the requirements. The comments describe how to use it. Most hashes can be modeled like this: Three tricks promote speed:
  • Mixing is done on three 4-byte registers rather than on a 1-byte quantity.
  • 19. A Hash Function For Hash Table Lookup
    Larger results can be made by running it several times with different initial hashvalues. CRC hashing. Generalized CRC hashing. This takes 9n+3 instructions.
    http://burtleburtle.net/bob/hash/doobs.html
    Abstract
    I offer you a new hash function for hash table lookup that is faster and more thorough than the one you are using now. I also give you a way to verify that it is more thorough.
    The Hash
    Over the past two years I've built a general hash function for hash table lookup. Most of the two dozen old hashes I've replaced have had owners who wouldn't accept a new hash unless it was a plug-in replacement for their old hash, and was demonstrably better than the old hash. These old hashes defined my requirements:
    • The keys are unaligned variable-length byte arrays.
    • Sometimes keys are several such arrays.
    • Sometimes a set of independent hash functions were required.
    • Average key lengths ranged from 8 bytes to 200 bytes.
    • Keys might be character strings, numbers, bit-arrays, or weirder things.
    • Table sizes could be anything, including powers of 2.
    • The hash must be faster than the old one.
    • The hash must do a good job.
    Without further ado, here's the fastest hash I've been able to design that meets all the requirements. The comments describe how to use it. Most hashes can be modeled like this: Three tricks promote speed:
  • Mixing is done on three 4-byte registers rather than on a 1-byte quantity.
  • 20. WELCOME TO THE SOUTH FLORIDA BASH HOMEPAGE
    Bike hashing every other Sunday. Provides contacts, related links, upcoming bash details, and their telephone hotline.
    http://www.geocities.com/hurricaneh3/bash/
    Welcome To The Palm Beach Bike-O-Psycho Homepage Bikes And Beer What a Concept Founded September 10, 2000 New Hotline 561-752-BEER E-mail contacts; Patchworkquilt SuckMeDry If you would like to get outside, meet some new people, bike together for an hour or so and then socialize over a 'few cold ones', read on ....... We are The Hash House Harriers, a loosely knit international group with chapters in every major U.S. city and 164 countries around the world. A typical trail ride (Bash) involves two members (Hares) leaving the pre-arranged meeting point with a ten minute lead, using flour thrown from a backpack the two mark a trail through woods, tracks and bike trails for the 'pack' to follow in an effort to catch them before they reach the ending spot where the beer is hidden!! To get there you have to follow the trail the 'hares' have marked, the whole concept is based on the old English game of "Hare and Hounds". The trail is typically 10-15 miles in length and covers a wide variety of terrain. A Mountain Bike is preferred!

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 1     1-20 of 168    1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

    free hit counter