Showing 11 open source projects for "lsh"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 1
    LSHSUM

    LSHSUM

    TTAK.KO-12.0276 LSH Recursive Hasher written in Go

    This project is licensed under the ISC License. Copyright © 2020-2021 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/lshsum Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Reformer PyTorch

    Reformer PyTorch

    Reformer, the efficient Transformer, in Pytorch

    This is a Pytorch implementation of Reformer. It includes LSH attention, reversible network, and chunking. It has been validated with an auto-regressive task (enwik8).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    LSHMAC

    LSHMAC

    LSH-256 Hash-based Message Autentication Code Utility

    This project is licensed under the ISC License. Copyright © 2020-2021 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/lshsum Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    KISA Toolkit

    KISA Toolkit

    Korea Internet & Security Agency's Cipher Suite written in Go

    Golang implementation of cryptographic algorithms designed by Republic of Korea. The Korea Internet & Security Agency (KISA) is distributing source codes that you can easily use. South Korean National Standard Algorithms: • LSH Message digest algorithm. 256/512-bit hash value. • ARIA 128-bit Block cipher with 128/192/256-bit keys. • LEA 128-bit Block cipher with 128/192/256-bit keys. • SEED 128-bit Block cipher with 128/256-bit keys. • HIGHT 64-bit Block cipher with 128bit key. Cryptographic Functions: • Symmetric Encryption/Decryption • Hash Digest • CMAC (Cipher-based message authentication code) • HMAC (Hash-based message authentication code) • PBKDF2 (Password-based key derivation function 2) Copyright (c) 2020-2021 Pedro Albanese - ALBANESE Lab Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 5
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    HIERDENC

    Clustering of categorical data sets with locality-sensitive hashing

    ...The clustering is achieved via a locality-sensitive hashing of categorical datasets for speed and scalability. The locality-sensitive hashing method implemented is described in the video lectures under www.mmds.org (Chapter 3). Information needed for LSH, such as shingles/tokens, MinHash signatures, band hashes to buckets are stored in several database tables. Information needed for clustering purposes, such as the most significant pairwise object similarities and density-based similarities are also stored in tables. An early version of the fast database-based retrieval of nearest neighbors and clustering in large categorical datasets was published in: Bill Andreopoulos, Aijun An, Xiaogang Wang, Dirk Labudde. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This library implements several locality sensitive hashing(LSH) based algorithms, including indexing data structure for high dimensional spaces and metric spaces, sketch constructions and set embedding algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Locality Sensitive Hashing is an improved indexing method for high dimensional data. lshtools provides indexing with LSH and an intelligent non supervised subsampling strategy using this indexing method.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    RAMdisk-based Operating System for conducting Security Audits. Includes hping2, xprobe, netcat, lsh, wardialer, and more -- all on 1 computer disk. Runs off your RAM, so there is no need to reformat your computer. Great for pen testing!
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 10
    Lisp Shell is a shell, in wich lisp-like syntax is used. It is written in C and uses GNU readline library. This program is intended to scripts, wich you may write using LISP programming language. LSH was tested with Linux and FreeBSD on i386.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SSH2 client for MacOS before X, based on BetterTelnet, lsh and GUSI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB