Results 51 to 60 of about 20,415 (157)
Cache-Oblivious Peeling of Random Hypergraphs
The computation of a peeling order in a randomly generated hypergraph is the most time-consuming step in a number of constructions, such as perfect hashing schemes, random $r$-SAT solvers, error-correcting codes, and approximate set encodings.
Belazzougui, Djamal +4 more
core +1 more source
Linear-scaling and parallelizable algorithms for stochastic quantum chemistry
For many decades, quantum chemical method development has been dominated by algorithms which involve increasingly complex series of tensor contractions over one-electron orbital spaces.
Alavi, Ali +2 more
core +1 more source
Quantum Channel Capacity of Very Noisy Channels
We present a family of additive quantum error-correcting codes whose capacities exceeds that of quantum random coding (hashing) for very noisy channels. These codes provide non-zero capacity in a depolarizing channel for fidelity parameters $f$ when $f> .
A. Ekert +26 more
core +2 more sources
On the Phase Space of Block-Hiding Strategies in Bitcoin-like networks [PDF]
We calculate the probability of success of block-hiding mining strategies in Bitcoin-like networks. These strategies involve building a secret branch of the block-tree and publishing it opportunistically, aiming to replace the top of the main branch and ...
Shomer, Assaf
core +1 more source
Complexity analysis and performance of double hashing sort algorithm [PDF]
Sorting an array of n elements represents one of the leading problems in different fields of computer science such as databases, graphs, computational geometry, and bioinformatics. A large number of sorting algorithms have been proposed based on different strategies. Recently, a sequential algorithm, called double hashing sort (DHS) algorithm, has been
openaire +2 more sources
In-packet Bloom filters: Design and networking applications
The Bloom filter (BF) is a well-known space-efficient data structure that answers set membership queries with some probability of false positives. In an attempt to solve many of the limitations of current inter-networking architectures, some recent ...
Macapuna, Carlos A. +4 more
core
High-Throughput and Memory-Efficient Pipeline Key-Value Store Architecture on FPGA. [PDF]
Wang X, Liu L, Li Y.
europepmc +1 more source
Enhancing confidentiality and access control in electronic health record systems using a hybrid hashing blockchain framework. [PDF]
Chakravarthy DG +3 more
europepmc +1 more source
2D-Cosine power sine coupled map with fractal-Fibonacci fusion for hyperchaotic image encryption. [PDF]
Kumar M, Ch D.
europepmc +1 more source

