Digital Library


Search: "[ keyword: 해시 ]" (7)
    An Improved Signature Hashing Algorithm for High Performance Network Intrusion Prevention System
    Joong Sik Ko , Hu Keun Kwak , Jeong Seok Wang , Hui Ung Kwon , Kyu Sik Chung The KIPS Transactions:PartC, Vol. 16, No. 4, pp. 449-460, Aug. 2009
    10.3745/KIPSTC.2009.16.4.449

    An Efficient Hashing Mechanism of the DHP Algorithm for Mining Association Rules
    Hyung Bong Lee The KIPS Transactions:PartD, Vol. 13, No. 5, pp. 651-660, Oct. 2006
    10.3745/KIPSTD.2006.13.5.651

    Block Allocation Method for Efficiently Managing Temporary Files of Hash Joins on SSDs
    Joontae Kim, Sangwon Lee KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 12, pp. 429-436, Dec. 2022
    https://doi.org/10.3745/KTCCS.2022.11.12.429
    Keywords: Hash Join, Temporary File, SSD, Trim, fallocate

    Design and Implementation of an Ethereum-Based Deliverables Management System for Public Information Software Project
    Lee Eun Ju, Kim Jin Wook KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 6, pp. 175-184, Jun. 2022
    https://doi.org/10.3745/KTCCS.2022.11.6.175
    Keywords: Ethereum, Smart Contract, Deliverable, Blockchain, Hash

    Matrix Character Relocation Technique for Improving Data Privacyin Shard-Based Private Blockchain Environments
    Yeol Kook Lee, Jung Won Seo, Soo Young Park KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 2, pp. 51-58, Feb. 2022
    https://doi.org/10.3745/KTCCS.2022.11.2.51
    Keywords: Blockchain, data privacy, Hash Algorithm, Shard

    A Pipelined Hash Join Method for Load Balancing
    Jin Gue Moon , No Sang Park , Pyeng Jung Kim , Seong Il Kim The KIPS Transactions:PartD, Vol. 9, No. 5, pp. 755-768, Oct. 2002
    10.3745/KIPSTD.2002.9.5.755

    Wall Cuckoo: A Method for Reducing Memory Access Using Hash Function Categorization
    Seong-kwang Moon, Dae-hong Min, Rhong-ho Jang, Chang-hun Jung, Dae-hun Nyang, Kyung-hee Lee KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 6, pp. 127-138, Jun. 2019
    https://doi.org/10.3745/KTCCS.2019.8.6.127
    Keywords: Open Addressing, Hash Table, Cuckoo Hashing, Key-Value Store, In-Memory Cache