ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

70 results

Programming threads
Python Dictionaries Explained: Hashing, Performance & Big O Notation

Master Python dictionaries from the ground up — from the basic structure to how they work behind the scenes. In this tutorial, we ...

13:57
Python Dictionaries Explained: Hashing, Performance & Big O Notation

229 views

1 year ago

Craig Piercy
Python built-in function: hash()

Keep in mind that `hash()` is most useful behind the scenes, as Python handles most hashing automatically for its built-in data ...

4:46
Python built-in function: hash()

166 views

9 months ago

MMqd
The Function Every Graphics Programmer Gets Wrong

Find out why sine‑based hashes fall short and how uint‑based hashes outperform them. I'll walk you through my extensible uint ...

12:36
The Function Every Graphics Programmer Gets Wrong

1,087 views

8 months ago

Programming threads
Why Python Dicts Use 33% Extra Memory

Python dictionaries are FAST - but do you know WHY? Understanding hash tables, collisions, and memory allocation will ...

0:57
Why Python Dicts Use 33% Extra Memory

1,121 views

2 months ago

Cours Python
3.3 Tables de hash

En Python, il faut savoir que les tables de hash ont été implémentées de manière très efficace ; vous n'avez pas à vous ...

8:18
3.3 Tables de hash

5,975 views

7 years ago

Jon Gjengset
Live-coding a linked hash map in Rust

Following another Twitter poll (https://twitter.com/Jonhoo/status/1000102031925956610), we're building a simple hash map in ...

2:29:40
Live-coding a linked hash map in Rust

39,310 views

7 years ago

J David Eisenberg
Chapter 12: Dictionaries

This video describes how to use a dictionary --- a set of key-and-value pairs. Other programming languages have similar ...

11:56
Chapter 12: Dictionaries

256 views

7 years ago

Tech Algo Views
Two Sum - English #Algorithm #Array #HashMap  #LeetCode #Two Sum

Two Sum - English version Problem description: https://leetcode.com/problems/two-sum/description/ Solution code: ...

0:57
Two Sum - English #Algorithm #Array #HashMap #LeetCode #Two Sum

74 views

1 year ago

Neo4j
Creating and Manipulating Data-Structures (Map, Dict, Hash) with APOC (#7)

While Cypher can create and use literal maps/documents, APOC adds functions to create and update them dynamically and also ...

14:44
Creating and Manipulating Data-Structures (Map, Dict, Hash) with APOC (#7)

3,695 views

7 years ago

Wisc-Online
CRC - Cyclic Redundancy Check

Learn what the CRC is, the technology behind it, and how it's performed.

6:05
CRC - Cyclic Redundancy Check

144,267 views

9 years ago

Solve Computer Science
Share Substack Notes on Mastodon via Jekyll - Part 2

Substack, the famous newsletter website, also has "Notes" which can be seen as similar to Tweets, Toots, etc... In this video I show ...

8:24
Share Substack Notes on Mastodon via Jekyll - Part 2

26 views

4 months ago

openOV
NeTEx Tutorial 1: The Basics in Python

This video contains a bit of background of the NeTEx standard to exchange public transport network and timetables. A series on ...

11:45
NeTEx Tutorial 1: The Basics in Python

600 views

2 years ago

Cube Drone
Cube Drone - Bloom Filters

For more information on Bloom Filters, check the Wikipedias: http://en.wikipedia.org/wiki/Bloom_filter , for special topics like "How ...

3:32
Cube Drone - Bloom Filters

36,378 views

11 years ago

MalwareAnalysisForHedgehogs
Malware Theory - Imphash algorithm explained

The imphash or import hash by Mandiant has been widely adopted by malware databases, security software and PE tools. What is ...

5:43
Malware Theory - Imphash algorithm explained

5,842 views

4 years ago

John Kubiatowicz
CS162 Lecture 24 (4/28/2020): Distributed File Systems (Finished), Key-Value Stores, and Chord

In this lecture we finish our discussion of Distributed File Systems and cache consistency, and then dive into a discussion of ...

1:25:22
CS162 Lecture 24 (4/28/2020): Distributed File Systems (Finished), Key-Value Stores, and Chord

1,861 views

5 years ago

Haskell Weekly
Hash Flooding Aeson

Special guest Tom Sydney Kerckhove talks with Taylor Fausak about a denial of service vulnerability in Aeson, a Haskell library ...

26:13
Hash Flooding Aeson

71 views

4 years ago

Confreaks
RubyConf 2018 - Cache is King: Get the Most Bang for Your Buck From Ruby by Molly Struve

RubyConf 2018 - Cache is King: Get the Most Bang for Your Buck From Ruby by Molly Struve Sometimes your fastest queries can ...

33:20
RubyConf 2018 - Cache is King: Get the Most Bang for Your Buck From Ruby by Molly Struve

4,534 views

7 years ago

Jon Gjengset
Porting Java's ConcurrentHashMap to Rust (part 2)

In this stream we continue the work of porting Java's ConcurrentHashMap to Rust. We finish up the concurrent hash table resizing ...

5:20:13
Porting Java's ConcurrentHashMap to Rust (part 2)

13,414 views

6 years ago

Monero Guides
01x01 - Importing Public Keys & Verifying Hashes

Prerequisites: Kleopatra (GPG4Win) - https://www.gpg4win.org/download.html GPG2 (Linux) .

15:54
01x01 - Importing Public Keys & Verifying Hashes

2,537 views

3 years ago

Govine I.T Solutions
Building a GUI Password Generator | Part 1| How to create secure passwords

What's up everybody I am Dev Govine, In the next lessons we will be creating this application using python and thinker. but before ...

1:26
Building a GUI Password Generator | Part 1| How to create secure passwords

32 views

4 years ago