- Robin Hood hashing (Research report. University of Waterloo. Department of Computer Science) by Pedro Celis,  1986
 - Relative prime transformation aids the minimal perfect hashing function by Celestina T Fung,  1986
 - Dynamic file organizations for partial match retrieval based on linear hashing (Technical report. University of Minnesota. Institute of Technology. Computer Science Dept) by T. S Yuen,  1985
 - A general purpose scatter storage subsystem and a comparison of hashing methods (SuDoc NAS 1.26:175814) by Steven C. Macy,  1984
 - Searching on alphanumeric keys using local balanced trie hashing (Technical report. Carleton University. School of Computer Science) by Ekow J Otoo,  1987
 - Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers (Lecture Notes in Computer Science) 
 - String Processing and Information Retrieval: 16th International Symposium, SPIRE 2009 Saariselkä, Finland, August 25-27, 2009 Proceedings (Lecture Notes ... Computer Science and General Issues) 
 - Cryptographic Libraries for Developers (Programming Series) by Ed Moyle, Diana Kelley,  2005-12-15
 - Graph-Based Representations in Pattern Recognition: 7th IAPR-TC-15 International Workshop, GbRPR 2009, Venice, Italy, May 26-28, 2009. Proceedings (Lecture ... Vision, Pattern Recognition, and Graphics) 
 - Unique file identification in the National Software Reference Library [An article from: Digital Investigation] by S. Mead,  2006-09-01
 - Accurate discovery of co-derivative documents via duplicate text detection [An article from: Information Systems] by Y. Bernstein, J. Zobel,  2006-11-01
 - Searching algorithms (Teubner-Texte zur Mathematik) by J Wiedermann,  1987
 - Using hash functions as a hedge against chosen ciphertext attack (Research report / International Business Machines Corporation. Research Division) by Victor Shoup,  1999
 - A lexical analogy to feature matching and pose estimation (SuDoc C 13.58:6790) by John Albert Horst,  2002
   |