In machine learning, feature hashing, also known as the hashing trick (by analogy to the kernel trick), is a fast and space-efficient way of vectorizing...
20 KB (3,124 words) - 18:26, 13 May 2024
In computer science, locality-sensitive hashing (LSH) is a fuzzy hashing technique that hashes similar input items into the same "buckets" with high probability...
30 KB (4,024 words) - 17:28, 16 April 2025
hashing is known as geometric hashing or the grid method. In these applications, the set of all inputs is some sort of metric space, and the hashing function...
50 KB (7,467 words) - 11:20, 14 April 2025
Bag-of-words model (section Hashing trick)
is the hashing trick, where words are mapped directly to indices with a hashing function. Thus, no memory is required to store a dictionary. Hash collisions...
8 KB (926 words) - 02:51, 2 February 2025
password hashing is performed; original passwords cannot be recalculated from the stored hash value. However, use of standard cryptographic hash functions...
49 KB (6,299 words) - 20:13, 4 May 2025
methods that require a high-quality hash function, including hopscotch hashing, cuckoo hashing, and the MinHash technique for estimating the size of...
19 KB (2,762 words) - 13:24, 2 September 2024
Merkle tree (redirect from Tiger-Tree Hash)
the above picture hash 0 is the result of hashing the concatenation of hash 0-0 and hash 0-1. That is, hash 0 = hash( hash 0-0 + hash 0-1 ) where "+" denotes...
15 KB (1,790 words) - 06:31, 3 March 2025
Bloom filter (category Hashing)
double hashing and triple hashing, variants of double hashing that are effectively simple random number generators seeded with the two or three hash values...
90 KB (10,780 words) - 13:15, 31 January 2025
Count sketch (category Hash-based data structures)
nearly identical[citation needed] to the Feature hashing algorithm by John Moody, but differs in its use of hash functions with low dependence, which makes...
9 KB (1,466 words) - 10:09, 4 February 2025
points for the basis is another approach for geometric hashing. Similar to the example above, hashing applies to higher-dimensional data. For three-dimensional...
8 KB (1,085 words) - 08:18, 10 January 2025
computer science and data mining, MinHash (or the min-wise independent permutations locality sensitive hashing scheme) is a technique for quickly estimating...
25 KB (3,204 words) - 13:19, 10 March 2025
Rainbow table (category Cryptographic hash functions)
this attack is to compute the hashes using a key derivation function that adds a "salt" to each password before hashing it, with different passwords receiving...
24 KB (3,485 words) - 19:40, 2 April 2025
LAN Manager (redirect from LM hash)
which is the LM hash. LAN Manager authentication uses a particularly weak method of hashing a user's password known as the LM hash algorithm, stemming...
20 KB (1,988 words) - 07:25, 2 May 2025
Count–min sketch (category Hashing)
sketch not a linear sketch, it is still mergeable. Feature hashing Locality-sensitive hashing MinHash The following discussion assumes that only "positive"...
10 KB (1,436 words) - 03:16, 28 March 2025
hash algorithm". Retrieved 2017-01-21. "Moving to SipHash-1-3 #73596". GitHub. McVey, Samantha (2018-07-16). "Implement SipHash, use as our hashing function...
14 KB (1,342 words) - 17:18, 17 February 2025
a model (e.g. a classifier) by a single pass over a training set. Feature hashing Stochastic gradient descent Lower bounds have been computed for many...
26 KB (3,608 words) - 17:48, 8 March 2025
features itself. Covariate Dimensionality reduction Feature engineering Hashing trick Statistical classification Explainable artificial intelligence Bishop...
9 KB (1,027 words) - 20:39, 23 December 2024
Farthest-first traversal Fast-and-frugal trees Feature Selection Toolbox Feature hashing Feature scaling Feature vector Firefly algorithm First-difference...
39 KB (3,386 words) - 22:50, 15 April 2025
SHA-1 (redirect from SHA-1 hash)
ISBN 978-3-540-71038-7. "NIST Brief Comments on Recent Cryptanalytic Attacks on Secure Hashing Functions and the Continued Security Provided by SHA-1". 23 August 2017...
50 KB (5,744 words) - 14:18, 17 March 2025
single feature. An entry in a hash table is created predicting the model location, orientation, and scale from the match hypothesis. The hash table is...
69 KB (9,232 words) - 19:22, 19 April 2025
History of American football (category Featured articles)
championship game since 1902 and the first American football game to feature hash marks, forward passes anywhere behind the line of scrimmage, and the...
158 KB (17,290 words) - 05:47, 23 January 2025
the hash is a hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a...
15 KB (1,775 words) - 00:53, 23 January 2025
and iterative process. Covariate Data transformation Feature extraction Feature learning Hashing trick Instrumental variables estimation Kernel method...
20 KB (2,183 words) - 19:57, 16 April 2025
Torrent file (section Distributed hash tables)
merkle root hashes for each piece. The new format uses SHA-256 in both the piece-hashing and the infohash, replacing the broken SHA-1 hash. The "btmh"...
18 KB (2,303 words) - 10:10, 4 April 2025
Mittelbach, Arno; Fischlin, Marc (2021). "Non-cryptographic Hashing". The Theory of Hash Functions and Random Oracles. Cham: Springer International Publishing...
7 KB (796 words) - 00:45, 28 April 2025
Digital video fingerprinting (redirect from Video hash)
Video fingerprinting or video hashing are a class of dimension reduction techniques in which a system identifies, extracts and then summarizes characteristic...
13 KB (1,470 words) - 04:02, 2 April 2025
Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as...
20 KB (2,329 words) - 22:48, 23 December 2024
of hashing, making it non-secure unless used in conjunction with TLS. Technically, digest authentication is an application of cryptographic hashing with...
25 KB (2,879 words) - 05:47, 26 April 2025
Shebang (Unix) (redirect from Hash-bang)
sequence #!, consisting of the characters number sign (also known as sharp or hash) and exclamation mark (also known as bang), at the beginning of a script...
25 KB (3,233 words) - 02:29, 17 March 2025
Vertical service code (redirect from Calling feature)
service code (VSC) is a sequence of digits and the signals star (*) and pound/hash (#) dialed on a telephone keypad or rotary dial to access certain telephone...
10 KB (498 words) - 06:28, 27 January 2025