Results 191 to 200 of about 2,148,635 (268)
Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security. [PDF]
Javed A+5 more
europepmc +1 more source
One chiral fingerprint to find them all. [PDF]
Orsi M, Reymond JL.
europepmc +1 more source
Use Cases Requiring Privacy-Preserving Record Linkage in Paediatric Oncology. [PDF]
Hayn D+10 more
europepmc +1 more source
Tissue determinants of the human T cell receptor repertoire.
Sureshchandra S+17 more
europepmc +1 more source
External Double Hashing with Choice
A novel extension to external double hashing providing significant reduction to both successful and unsuccessful search lengths is presented. The experimental and analytical results demonstrate the reductions possible. This method does not restrict the hashing table configuration parameters and utilizes very little additional storage space per bucket ...
Walter A. Burkhard
semanticscholar +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Fine-Grained Hashing With Double Filtering
IEEE Transactions on Image Processing, 2022Fine-grained hashing is a new topic in the field of hashing-based retrieval and has not been well explored up to now. In this paper, we raise three key issues that fine-grained hashing should address simultaneously, i.e., fine-grained feature extraction, feature refinement as well as a well-designed loss function.
Zhen-Duo Chen+4 more
openaire +3 more sources
Computing in Science & Engineering, 2017
In the past few years, researchers have introduced several sorting algorithms to enhance time complexity, space complexity, and stability. A double hashing methodology first collects statistics about element distribution and then maps between elements of the array and indexes based on the knowledge collected during the first hashing.
Yasser M. K. Omar, Amr Badr, Hoda Osama
openaire +3 more sources
In the past few years, researchers have introduced several sorting algorithms to enhance time complexity, space complexity, and stability. A double hashing methodology first collects statistics about element distribution and then maps between elements of the array and indexes based on the knowledge collected during the first hashing.
Yasser M. K. Omar, Amr Badr, Hoda Osama
openaire +3 more sources
Double-Hashing Operation Mode for Encryption
2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), 2017Block ciphers, hash-based encryption, and public-key ciphers are examples of data encryption techniques with different desired features. Strong block ciphers, like AES, must run in some mode of operation to encrypt data larger than the block size. Public-key ciphers, like RSA, are costly and usually used for key-sharing rather than encrypting the data ...
Sultan Almuhammadi, Ahmad Amro
openaire +3 more sources