• In machine learning, feature hashing, also known as the hashing trick (by analogy to the kernel trick), is a fast and space-efficient way of vectorizing...
    20 KB (3,124 words) - 18:26, 13 May 2024
  • In computer science, locality-sensitive hashing (LSH) is a fuzzy hashing technique that hashes similar input items into the same "buckets" with high probability...
    30 KB (4,024 words) - 17:28, 16 April 2025
  • Thumbnail for Hash function
    hashing is known as geometric hashing or the grid method. In these applications, the set of all inputs is some sort of metric space, and the hashing function...
    50 KB (7,467 words) - 11:20, 14 April 2025
  • is the hashing trick, where words are mapped directly to indices with a hashing function. Thus, no memory is required to store a dictionary. Hash collisions...
    8 KB (926 words) - 02:51, 2 February 2025
  • Thumbnail for Cryptographic hash function
    password hashing is performed; original passwords cannot be recalculated from the stored hash value. However, use of standard cryptographic hash functions...
    49 KB (6,299 words) - 20:13, 4 May 2025
  • methods that require a high-quality hash function, including hopscotch hashing, cuckoo hashing, and the MinHash technique for estimating the size of...
    19 KB (2,762 words) - 13:24, 2 September 2024
  • points for the basis is another approach for geometric hashing. Similar to the example above, hashing applies to higher-dimensional data. For three-dimensional...
    8 KB (1,085 words) - 08:18, 10 January 2025
  • Thumbnail for Merkle tree
    Merkle tree (redirect from Tiger-Tree Hash)
    the above picture hash 0 is the result of hashing the concatenation of hash 0-0 and hash 0-1. That is, hash 0 = hash( hash 0-0 + hash 0-1 ) where "+" denotes...
    15 KB (1,790 words) - 06:31, 3 March 2025
  • Count sketch (category Hash-based data structures)
    nearly identical[citation needed] to the Feature hashing algorithm by John Moody, but differs in its use of hash functions with low dependence, which makes...
    9 KB (1,466 words) - 10:09, 4 February 2025
  • Bloom filter (category Hashing)
    double hashing and triple hashing, variants of double hashing that are effectively simple random number generators seeded with the two or three hash values...
    90 KB (10,780 words) - 13:15, 31 January 2025
  • computer science and data mining, MinHash (or the min-wise independent permutations locality sensitive hashing scheme) is a technique for quickly estimating...
    25 KB (3,204 words) - 13:19, 10 March 2025
  • Rainbow table (category Cryptographic hash functions)
    this attack is to compute the hashes using a key derivation function that adds a "salt" to each password before hashing it, with different passwords receiving...
    24 KB (3,485 words) - 19:40, 2 April 2025
  • LAN Manager (redirect from LM hash)
    which is the LM hash. LAN Manager authentication uses a particularly weak method of hashing a user's password known as the LM hash algorithm, stemming...
    20 KB (1,988 words) - 07:25, 2 May 2025
  • Count–min sketch (category Hashing)
    sketch not a linear sketch, it is still mergeable. Feature hashing Locality-sensitive hashing MinHash The following discussion assumes that only "positive"...
    10 KB (1,436 words) - 03:16, 28 March 2025
  • hash algorithm". Retrieved 2017-01-21. "Moving to SipHash-1-3 #73596". GitHub. McVey, Samantha (2018-07-16). "Implement SipHash, use as our hashing function...
    14 KB (1,342 words) - 17:18, 17 February 2025
  • a model (e.g. a classifier) by a single pass over a training set. Feature hashing Stochastic gradient descent Lower bounds have been computed for many...
    26 KB (3,608 words) - 17:48, 8 March 2025
  • Farthest-first traversal Fast-and-frugal trees Feature Selection Toolbox Feature hashing Feature scaling Feature vector Firefly algorithm First-difference...
    39 KB (3,386 words) - 22:50, 15 April 2025
  • features itself. Covariate Dimensionality reduction Feature engineering Hashing trick Statistical classification Explainable artificial intelligence Bishop...
    9 KB (1,027 words) - 20:39, 23 December 2024
  • SHA-1 (redirect from SHA-1 hash)
    ISBN 978-3-540-71038-7. "NIST Brief Comments on Recent Cryptanalytic Attacks on Secure Hashing Functions and the Continued Security Provided by SHA-1". 23 August 2017...
    50 KB (5,744 words) - 14:18, 17 March 2025
  • single feature. An entry in a hash table is created predicting the model location, orientation, and scale from the match hypothesis. The hash table is...
    69 KB (9,232 words) - 19:22, 19 April 2025
  • the hash is a hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a...
    15 KB (1,775 words) - 00:53, 23 January 2025
  • History of American football (category Featured articles)
    championship game since 1902 and the first American football game to feature hash marks, forward passes anywhere behind the line of scrimmage, and the...
    158 KB (17,290 words) - 05:47, 23 January 2025
  • and iterative process. Covariate Data transformation Feature extraction Feature learning Hashing trick Instrumental variables estimation Kernel method...
    20 KB (2,183 words) - 19:57, 16 April 2025
  • merkle root hashes for each piece. The new format uses SHA-256 in both the piece-hashing and the infohash, replacing the broken SHA-1 hash. The "btmh"...
    18 KB (2,303 words) - 10:10, 4 April 2025
  • Mittelbach, Arno; Fischlin, Marc (2021). "Non-cryptographic Hashing". The Theory of Hash Functions and Random Oracles. Cham: Springer International Publishing...
    7 KB (796 words) - 00:45, 28 April 2025
  • Video fingerprinting or video hashing are a class of dimension reduction techniques in which a system identifies, extracts and then summarizes characteristic...
    13 KB (1,470 words) - 04:02, 2 April 2025
  • Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as...
    20 KB (2,329 words) - 22:48, 23 December 2024
  • service code (VSC) is a sequence of digits and the signals star (*) and pound/hash (#) dialed on a telephone keypad or rotary dial to access certain telephone...
    10 KB (498 words) - 06:28, 27 January 2025
  • Shebang (Unix) (redirect from Hash-bang)
    sequence #!, consisting of the characters number sign (also known as sharp or hash) and exclamation mark (also known as bang), at the beginning of a script...
    25 KB (3,233 words) - 02:29, 17 March 2025
  • Are Stardust" secured the 38th position on April 22, 2021. LukHash's music is also featured in various gaming titles, such as the Double Dragon trilogy...
    5 KB (326 words) - 20:48, 5 May 2025