- Robin Hood hashing (Research report. University of Waterloo. Department of Computer Science) by Pedro Celis, 1986
- Relative prime transformation aids the minimal perfect hashing function by Celestina T Fung, 1986
- Dynamic file organizations for partial match retrieval based on linear hashing (Technical report. University of Minnesota. Institute of Technology. Computer Science Dept) by T. S Yuen, 1985
- A general purpose scatter storage subsystem and a comparison of hashing methods (SuDoc NAS 1.26:175814) by Steven C. Macy, 1984
- Searching on alphanumeric keys using local balanced trie hashing (Technical report. Carleton University. School of Computer Science) by Ekow J Otoo, 1987
- Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers (Lecture Notes in Computer Science)
- String Processing and Information Retrieval: 16th International Symposium, SPIRE 2009 Saariselkä, Finland, August 25-27, 2009 Proceedings (Lecture Notes ... Computer Science and General Issues)
- Cryptographic Libraries for Developers (Programming Series) by Ed Moyle, Diana Kelley, 2005-12-15
- Graph-Based Representations in Pattern Recognition: 7th IAPR-TC-15 International Workshop, GbRPR 2009, Venice, Italy, May 26-28, 2009. Proceedings (Lecture ... Vision, Pattern Recognition, and Graphics)
- Unique file identification in the National Software Reference Library [An article from: Digital Investigation] by S. Mead, 2006-09-01
- Accurate discovery of co-derivative documents via duplicate text detection [An article from: Information Systems] by Y. Bernstein, J. Zobel, 2006-11-01
- Searching algorithms (Teubner-Texte zur Mathematik) by J Wiedermann, 1987
- Using hash functions as a hedge against chosen ciphertext attack (Research report / International Business Machines Corporation. Research Division) by Victor Shoup, 1999
- A lexical analogy to feature matching and pose estimation (SuDoc C 13.58:6790) by John Albert Horst, 2002
|