Results 21 to 30 of about 20,415 (157)
BackgroundOver the past decade, the emergence of several large federated clinical data networks has enabled researchers to access data on millions of patients at dozens of health care organizations.
Yu, Yun William, Weber, Griffin M
doaj +1 more source
Fast hashing with Strong Concentration Bounds
Previous work on tabulation hashing by Patrascu and Thorup from STOC'11 on simple tabulation and from SODA'13 on twisted tabulation offered Chernoff-style concentration bounds on hash based sums, e.g., the number of balls/keys hashing to a given bin, but
Aamand Anders +9 more
core +1 more source
Optimized Entanglement Purification [PDF]
We investigate novel protocols for entanglement purification of qubit Bell pairs. Employing genetic algorithms for the design of the purification circuit, we obtain shorter circuits achieving higher success rates and better final fidelities than what is ...
Albert, Victor V. +2 more
core +2 more sources
A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms, and it is used as a proof-of-work function in several cryptocurrencies.
Balatsoukas-Stimming, Alexios +4 more
core +2 more sources
Palm-Print Pattern Matching Based on Features Using Rabin-Karp for Person Identification
Palm-print based individual identification is regarded as an effectual method for identifying persons with high confidence. Palm-print with larger inner surface of hand contains many features such as principle lines, ridges, minutiae points, singular ...
S. Kanchana, G. Balakrishnan
doaj +1 more source
Approximately Minwise Independence with Twisted Tabulation [PDF]
A random hash function $h$ is $\varepsilon$-minwise if for any set $S$, $|S|=n$, and element $x\in S$, $\Pr[h(x)=\min h(S)]=(1\pm\varepsilon)/n$. Minwise hash functions with low bias $\varepsilon$ have widespread applications within similarity estimation.
A. Broder +6 more
core +1 more source
Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong +5 more
core +1 more source
Permutation-Based Hashing Beyond the Birthday Bound
It is known that the sponge construction is tightly indifferentiable from a random oracle up to around 2c/2 queries, where c is the capacity. In particular, it cannot provide generic security better than half of the underlying permutation size.
Charlotte Lefevre, Bart Mennink
doaj +1 more source
A Novel Lightweight Approach for Video Retrieval on Mobile Augmented Reality Environment
Mobile Augmented Reality merges the virtual objects with real world on mobile devices, while video retrieval brings out the similar looking videos from the large-scale video dataset.
Joolekha Bibi Joolee +4 more
doaj +1 more source
Quantum attacks on Bitcoin, and how to protect against them [PDF]
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh +4 more
core +3 more sources

