Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Hashing Algorithms
YouTube
education
#Locality-Sensitive Hashing
Showing:
32
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Great Learning
Hashing in Java
0
rewiews
Explore Java hashing concepts, including collision handling, HashTable, HashMap, LinkedHashMap, HashSet, and LinkedHashSet. Learn implementation techniques and problem-solving strategies.
Add to list
10
Lesons
1 hour 10 minutes
On-Demand
Free-Video
Linux Foundation
The Path of the Private FUTEX - Improving Kernel Performance and Latency
0
rewiews
Explore improvements in Linux kernel's futex implementation to reduce latency in contended locking and unlocking paths, benefiting both real-time and mainline systems, especially on large NUMA machines.
Add to list
23
Lesons
39 minutes
On-Demand
Free-Video
LASCON
Malware Clustering - Static and Dynamic Behavior Analysis
0
rewiews
Explore innovative malware clustering techniques using static and dynamic behavior analysis, machine learning, and similarity search for robust, scalable, and repeatable results.
Add to list
11
Lesons
49 minutes
On-Demand
Free-Video
Center for Language & Speech Processing(CLSP), JHU
Hearing Without Listening: Voice Authentication with Privacy
0
rewiews
Explore voice authentication privacy challenges and solutions, including cryptographic methods and secure binary embeddings for protecting user voice prints while enabling authentication.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
James Briggs
How LSH Random Projection Works in Search - Python
0
rewiews
Explore efficient similarity search using Locality Sensitive Hashing (LSH) and Random Projection. Learn how to handle large-scale data and implement approximate search techniques in Python.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
Data Science Conference
Under the Hood: Key Algorithms Powering Vector Search - HNSW, LSH, and PQ
0
rewiews
Dive into fundamental algorithms like HNSW, LSH, and PQ that power vector search and AI-driven databases, exploring their technical mechanisms and practical applications.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Discover AI
Reversible Transformer - GPU Memory Optimization Using ReFORMER and Reversible Residual Layers
0
rewiews
Delve into GPU memory optimization techniques for transformers, exploring reversible residual layers and locality-sensitive hashing to enhance deep neural network efficiency and performance.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
James Briggs
Locality Sensitive Hashing for Search with Shingling + MinHashing - Python
0
rewiews
Learn efficient similarity search using Locality Sensitive Hashing (LSH) with shingling and MinHashing techniques in Python. Explore implementation steps, from data preprocessing to LSH tuning, for approximate nearest neighbor search.
Add to list
9
Lesons
27 minutes
On-Demand
Free-Video
Stuff Made Here
World's Hardest Jigsaw vs. Puzzle Machine - All White
0
rewiews
Watch a puzzle machine tackle the world's hardest jigsaw—an all-white puzzle. Explore image processing, mathematical algorithms, and innovative engineering solutions in this challenging project.
Add to list
12
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
A New Distribution Sensitive Secure Sketch and Popularity Proportional Hashing
0
rewiews
Explores new techniques for secure password storage and authentication, including distribution-sensitive secure sketches and popularity proportional hashing, to enhance security against online and offline attacks.
Add to list
6
Lesons
24 minutes
On-Demand
Free-Video
IEEE
Private Nearest Neighbor Search with Sublinear Communication and Malicious Security
0
rewiews
Explore secure and efficient private nearest neighbor search techniques, focusing on sublinear communication and protection against malicious adversaries in two-party computation scenarios.
Add to list
10
Lesons
19 minutes
On-Demand
Free-Video
Yannic Kilcher
Reformer - The Efficient Transformer
0
rewiews
Discover how Reformer revolutionizes Transformer models, reducing memory usage and enabling processing of longer sequences through innovative techniques like Locality Sensitive Hashing and Reversible Networks.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Paul Browning
CompTIA CASP+ Certification Training - Cryptography and PKI
0
rewiews
Comprehensive training on cryptography and PKI for CompTIA CASP+ certification, covering hashing, encryption algorithms, protocols, and certificates. Includes practice exams and labs.
Add to list
6
Lesons
20 minutes
On-Demand
Free-Video
IEEE
Subsets and Supermajorities - Optimal Hashing-based Set Similarity Search
0
rewiews
Explore optimal hashing techniques for efficient set similarity search, focusing on subsets and supermajorities in data structures and algorithms.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
Hashing and Hash-and-Sign Techniques
0
rewiews
Explore cutting-edge cryptographic techniques in hashing and hash-and-sign protocols, presented by experts at PKC 2024, chaired by Eiichiro Fujisaki.
Add to list
1
Lesons
1 hour 22 minutes
On-Demand
Free-Video
Simons Institute
Long-context Attention in Near-Linear Time
0
rewiews
Explores HyperAttention, an innovative approach to tackle computational challenges in long-context LLMs, offering significant speed improvements while maintaining performance across various datasets.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Simons Institute
Efficiently Computing Similarities to Private Datasets
0
rewiews
Explore advanced techniques for computing similarities to private datasets, focusing on extroverted sublinear algorithms and their applications in data privacy.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Simons Institute
O(log s)-Approximate Nearest Neighbor Search for Earth Mover's Distance
0
rewiews
Explore advancements in nearest neighbor search for Earth Mover's Distance, improving approximation to Õ(log s) with sublinear query time using data-dependent LSH functions and tree embedding techniques.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
BSidesLV
Blind Hashing
0
rewiews
Explore blind hashing for enhanced password security, covering attack vectors, online vs offline attacks, and strategies to scale and protect against various threats.
Add to list
13
Lesons
30 minutes
On-Demand
Free-Video
IEEE
Kernel Density Estimation through Density Constrained Near Neighbor Search
0
rewiews
Explore kernel density estimation through near neighbor search, focusing on importance sampling, locality sensitive hashing, and data-dependent techniques for improved efficiency and accuracy.
Add to list
28
Lesons
24 minutes
On-Demand
Free-Video
Building Dictionaries and Destroying Hashes Using Amazon EC2
0
rewiews
Explore password cracking techniques using Amazon EC2, covering hashing algorithms, methodology tools, and cloud-based strategies for efficient and cost-effective password recovery.
Add to list
38
Lesons
1 hour 10 minutes
On-Demand
Free-Video
0xdade
Time Signature Based Matching for Data Fusion and Coordination Detection in Cyber Relevant Logs
0
rewiews
Methodology for detecting automated behavior in cyber logs using temporal pattern matching, scalable through locality sensitive hashing. Applications include anomaly detection and data fusion.
Add to list
7
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
Parallel Hashing via List Recoverability
0
rewiews
Explore parallel hashing techniques, focusing on list recoverability and its applications in cryptographic constructions like Merkle trees and domain extension schemes.
Add to list
10
Lesons
20 minutes
On-Demand
Free-Video
TheIACR
Structure Preserving Smooth Projective Hashing
0
rewiews
Explore advanced cryptographic techniques with a focus on structure-preserving smooth projective hashing, presented by experts at Asiacrypt 2016.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
EuroPython Conference
Speeding Up Search With Locality Sensitive Hashing
0
rewiews
Explore locality sensitive hashing for faster search and similarity comparisons, with practical Python implementations and real-world applications in image search and collaborative filtering.
Add to list
18
Lesons
24 minutes
On-Demand
Free-Video
JSConf
Node JS Authentication and Data Security
0
rewiews
Explore secure authentication and data protection in Node.js, covering OAuth 2, OpenID Connect, middleware services, hashing algorithms, and common pitfalls to build robust user and data security infrastructure.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
NDC Conferences
CompSci and My Day Job
0
rewiews
Practical application of computer science concepts in everyday development, from Big-O notation to cryptography, enhancing performance and security in real-world projects.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Devoxx
Highly Available, Distributed & Resilient Software Team
0
rewiews
Explore secure data handling in IoT SaaS using public-key encryption and hashing for pseudo-anonymization, balancing privacy, usability, and performance.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Simons Institute
A Quasi-Monte Carlo Algorithm for Smooth Kernel Evaluation
0
rewiews
Explore a novel data structure for density queries, combining discrepancy theory and LSH to build sparse coresets and enhance smooth kernel evaluation algorithms.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
UofU Data Science
Understanding Distance Metrics in Data Mining - Spring 2023
0
rewiews
Explore various distance metrics in data mining, from Euclidean and Manhattan to Mahalanobis and Angular, learning their applications, limitations, and relationships to LSH algorithms.
Add to list
20
Lesons
1 hour 20 minutes
On-Demand
Free-Video
Inside Livermore Lab
Scaling Up AI: Embedding Physics Modeling into End-to-end Learning and Harnessing Random Projection
0
rewiews
Explore AI-driven scientific discovery through embedding physics models in end-to-end learning and utilizing random projection for efficient simulation and gradient propagation in PDE-based systems.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Centre de recherches mathématiques - CRM
Generalizations of Matrix Multiplication for Solving the Light Bulb Problem
0
rewiews
Explore a novel approach to solving the Light Bulb Problem using tensor-based algorithms, potentially outperforming traditional matrix multiplication methods for faster data analysis and pattern recognition.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
load more...