×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [significant bits of]
Lecture 4: Direct and Indirect Interconnection Networks for Distributed- Memory Multiprocessors Shantanu Dutt Univ. of Illinois at Chicago
216 views
Data Structures and Algorithms Course slides: Hashing algis
234 views
Download powerpoint
606 views
Cache
600 views
An On-Chip IP Address Lookup Algorithm Author: Xuehong Sun and Yiqiang Q. Zhao Publisher: IEEE TRANSACTIONS ON COMPUTERS, 2005 Presenter: Yu Hao, Tseng
212 views
Hash-based Indexes CS 186, Spring 2006 Lecture 7 R &G Chapter 11 HASH, x. There is no definition for this word -- nobody knows what hash is. Ambrose Bierce,
234 views
Simple Backdoors for RSA Key Generation Scott Dial
218 views
Steganography detection Roland Cmorik, Martin Šumák
215 views
Pervasive Random Beacon in the Internet for Covert Coordination
17 views
Csci 136 Computer Architecture II – Multiplication and Division
42 views
Csci 136 Computer Architecture II – Multiplication and Division Xiuzhen Cheng
[email protected]
226 views
1 iAPX86 Protection Electronic Computers M. 2 Protection The protection mechanism is active only after PE setting in CR0 and is used before any access
213 views
Next >