Essays about: "hash"

Showing result 1 - 5 of 89 essays containing the word hash.

  1. 1. Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : John Alanko Öberg; Carl Svensson; [2023]
    Keywords : Coverless audio steganography; information hiding; covert communication; effective capacity; behavioral; Täcklös ljudsteganografi; informationsdöljning; hemlig kommunikation; effektiv kapacitet; beteendemässig;

    Abstract : Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. READ MORE

  2. 2. Time evaluation of lookups with Robin Hood Hashing and Linear Probing

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Patrik Dahlberg; [2023]
    Keywords : ;

    Abstract : Hash tables are used to store data in a way that is quickly retrieved from an array using the identifier of the data. When inserting data into a hash table it will sometimes attempt to place the data on a position in the array where there already exists data which means these collisions need to be handled. READ MORE

  3. 3. Improving network performance with a polarization-aware routing approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jingyi Pan; [2023]
    Keywords : Traffic engineering; Hash function; Multipath routing; Trafikteknik; Hash-funktion; Flervägsdirigering;

    Abstract : Traffic polarization in networks refers to the phenomenon where traffic tends to concentrate along specific routes or edges when doing multipath routing, leading to imbalanced flow patterns. This spatial distribution of traffic can result in congested and overburdened links, while other routes remain underutilized. READ MORE

  4. 4. Subtree Hashing of Tests in Build Systems : Rust Tricorder

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Calin Capitanu; [2023]
    Keywords : Build systems; tests execution; caching; Abstract Syntax Tree parsing; Sisteme de construire; Teste; Memorare in cache; Arbore sintactic abstract; Bygg system; tester; cachelagring; analys av abstrakt syntaxträd;

    Abstract : Software applications are built by teams of developers that constantly iterate over the codebase. Software projects rely on a build system, which handles the management of dependencies, compilation, testing, and deployment of the software. READ MORE

  5. 5. An Arrow Metalanguage for Partially Invertible Computation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anders Ågren Thuné; [2023]
    Keywords : Reversible computation; Domain-specific languages; Arrows; Partial invertibility; Reversibel beräkning; Domänspecifika språk; Arrows; Partiell inverterbarhet;

    Abstract : Programming languages traditionally describe computations going one way: a program might compute a hash value from a string, or an encrypted message from a plaintext. However, sometimes it is also of interest to go the other way around: for encryption, we not only want to encrypt messages but also to decrypt them, and to be sure that the decryption correctly reproduces the original message. READ MORE