ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

621 results

EuroPython Conference
Alexys Jacob - Leveraging consistent hashing in your python applications

"Leveraging consistent hashing in your python applications [EuroPython 2017 - Talk - 2017-07-11 - Anfiteatro 2] [Rimini, Italy] ...

43:30
Alexys Jacob - Leveraging consistent hashing in your python applications

909 views

8 years ago

Lucas Layman
Hash Functions and Hash Tables

... different hash functions are so a hash function will take an input which is going to be a value write a value of an object in Python ...

22:50
Hash Functions and Hash Tables

708 views

5 years ago

strager
Faster than Rust and C++: the PERFECT hash table

I had a week of fun designing and optimizing a perfect hash table. In this video, I take you through the journey of making a hash ...

33:52
Faster than Rust and C++: the PERFECT hash table

701,253 views

2 years ago

CppNow
C++Now 2018: You Can Do Better than std::unordered_map: New Improvements to Hash Table Performance

http://cppnow.org — Presentation Slides, PDFs, Source Code and other presenter materials are available at: ...

1:30:53
C++Now 2018: You Can Do Better than std::unordered_map: New Improvements to Hash Table Performance

60,653 views

7 years ago

The Dojo MX
Algoritmos de hashing para passwords

En este plática hablaremos de las cosas que todo programador debe de saber acerca de los algoritmos correctos para ...

1:14:08
Algoritmos de hashing para passwords

596 views

Streamed 5 years ago

Association Francophone Python
PyConFR 2018 - Leveraging consistent hashing in your python applications - Alexys Jacob

PyConFR 2018 - Leveraging consistent hashing in your python applications - Alexys Jacob.

49:18
PyConFR 2018 - Leveraging consistent hashing in your python applications - Alexys Jacob

91 views

7 years ago

CampusX
Data Structures and Algorithms using Python | Mega Video | DSA in Python in 1 video

Mastering data structures and algorithms is the key to writing efficient, scalable, and optimized code – a must for any aspiring ...

11:41:30
Data Structures and Algorithms using Python | Mega Video | DSA in Python in 1 video

1,363,689 views

2 years ago

Ian Finlayson
Hash Tables

Covers the main idea behind hash tables.

28:27
Hash Tables

205 views

5 years ago

Aaron Bauer
CS 111 Hashing and Recursion

We finish up with dictionaries by talking about hashing, the technique that makes them work efficiently. We then introduce a ...

56:07
CS 111 Hashing and Recursion

26 views

4 years ago

Aaron Bauer
CS 201 Hashing part 1

We finish working through the ListMap implementation and introduce the idea of hashing for a more efficient Map. Concerto A 4 ...

58:38
CS 201 Hashing part 1

29 views

3 years ago

J David Eisenberg
Chapter 5: Hash Tables

00:00 Hash Table Representation 02:30 Converting to generics 12:30 Looking up an API 13:10 Continue conversion 16:00 ...

53:18
Chapter 5: Hash Tables

53 views

1 year ago

Ian Finlayson
Hash Tables Continued

Covers dealing with collisions in a hash table, and a better hash table implementation.

31:43
Hash Tables Continued

173 views

5 years ago

Coding with Verrol
ep24.5 - Hashing (Extended)

In this video, we take a log at how to hash a string to a number. NOTE: This is the extended version, I show a bit more details ...

1:00:33
ep24.5 - Hashing (Extended)

336 views

5 years ago

EuroPython Conference
Maciej Kula - Speeding up search with locality sensitive hashing

Maciej Kula - Speeding up search with locality sensitive hashing [EuroPython 2015] [24 July 2015] [Bilbao, Euskadi, Spain] ...

24:06
Maciej Kula - Speeding up search with locality sensitive hashing

2,103 views

10 years ago

CMU Database Group
Lecture #11 - Join Algorithms (Hashing) [CMU Database Systems Spring 2016]

Annotated Video: http://cmudb.io/15721-s16-lect11 Slides PDF: http://15721.courses.cs.cmu.edu/spring2016/slides/11.pdf ...

1:13:48
Lecture #11 - Join Algorithms (Hashing) [CMU Database Systems Spring 2016]

1,247 views

9 years ago

Warwick RSE
Inside the black box - Hash Tables

One of the more obvious black boxes in computer programming is the ubiquitous "associative array" - a container that maps from a ...

24:05
Inside the black box - Hash Tables

62 views

3 years ago

Per Thorsheim
How To Screw Up Password Hashing: Secrets of a Password Cracker Author

Russell Graves (@Bitweasil) speaking at Passwordscon in Las Vegas, July 30-31, 2013. -- Password storage is one of the major ...

29:45
How To Screw Up Password Hashing: Secrets of a Password Cracker Author

877 views

12 years ago

Chris Ball
Mark Jason Dominus - Historical how and why of hash tables

Talk given to the Recurse Center on 2015-04-21. Slides: http://perl.plover.com/yak/HashHistory/ Abstract: Hash tables, dictionaries ...

59:28
Mark Jason Dominus - Historical how and why of hash tables

1,542 views

10 years ago

IACR
BLS signatures, hashing to curves, and more  dispatches from the IETF

Presentation by Riad S. Wahby (Stanford) at ACS'19. Abstract: We discuss advanced cryptography standardization at the IETF.

26:46
BLS signatures, hashing to curves, and more dispatches from the IETF

1,428 views

6 years ago

Soumil Speaks
3.Hash Tables: Hash Functions, Sets, & Maps | DSA in Python | Tamil | Soumil Speaks

Video Description: In this video, we dive deep into Hash Tables, one of the most important data structures in computer science.

33:41
3.Hash Tables: Hash Functions, Sets, & Maps | DSA in Python | Tamil | Soumil Speaks

80 views

6 months ago

media.ccc.de
Tonimir Kisasondi: UNHash - Methods for better password cracking

http://media.ccc.de/browse/congress/2014/31c3_-_5966_-_en_-_saal_1_-_201412292245_-_unhash_- ...

32:32
Tonimir Kisasondi: UNHash - Methods for better password cracking

727 views

10 years ago

IACR
Balloon Hashing  A Memory Hard Function Providing Provable Protection Against Sequential attacks

Dan Boneh and Henry Corrigan-Gibbs and Stuart E. Schechter. Talk at Asiacrypt 2016.

24:56
Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks

706 views

9 years ago

dist67
ssdeep Python Example Based On My Templates

More info: https://videos.didierstevens.com/2021/06/11/ssdeep-python-example-based-on-my-templates/

20:33
ssdeep Python Example Based On My Templates

1,258 views

4 years ago

Christiaan008
29C3: Hash-flooding DoS reloaded: attacks and defenses (EN)

Speakers: djb | Jean-Philippe Aumasson | Martin Boßlet At 28C3, Klink and Waelde showed that a number of technologies (PHP, ...

56:54
29C3: Hash-flooding DoS reloaded: attacks and defenses (EN)

3,572 views

12 years ago

Databases A2Z
Database Management System Full Course: Hash Tables | Databases A2Z

In this Database Management System full course, we'll learn about Hash Tables. This course is on the design and implementation ...

1:17:46
Database Management System Full Course: Hash Tables | Databases A2Z

4,024 views

4 years ago