Results 71 to 80 of about 1,483 (186)
Summary Phytoplankton, as primary producers, play a key role in aquatic ecosystems. Their community turnover is shaped by morphological traits that enable adaptation to diverse abiotic and biotic factors. Yet, the temporal scale of these dynamics remains poorly understood due to limited high‐frequency sampling studies.
Pavel Škaloud +4 more
wiley +1 more source
Frequent Items Mining Algorithm Over High Speed Network Flows Based on Double Hash Method
Lei Bai, Chao Chen
openalex +1 more source
Chinese Words Segmentation Based on Double Hash Dictionary Running on Hadoop [PDF]
Chao Feng, Bao-An Li
openalex +1 more source
Multi GPU Sparse Matrix by Sparse Matrix Multiplication
ABSTRACT The paper focuses on the improvement of the existing nsparse Nagasaka et al. algorithm and its extension to the multi‐GPU setting for the application of real engineering problems. In this work, we propose a distributed multi‐GPU framework for SpGEMM that is designed specifically for the nsparse like algorithms.
Artem Mavliutov +4 more
wiley +1 more source
Model Size Reduction Using Frequency Based Double Hashing for Recommender Systems [PDF]
Caojin Zhang +12 more
openalex +1 more source
A Systematic Overview of Caching Mechanisms to Improve Hadoop Performance
ABSTRACT In today's distributed computing environments, the rapid generation of large‐scale data from diverse sources poses significant challenges in terms of storage, management, and processing, particularly for traditional relational databases. Hadoop has emerged as a widely adopted framework for handling such data through parallel processing across ...
Rana Ghazali, Douglas G. Down
wiley +1 more source
Scaling Invariant Generation Using State Space Embeddings and GPU Streaming
ABSTRACT The formal verification of railway control systems can ensure the safety of complex scheme plans through techniques such as induction‐based model checking. While inductive verification performs well in complex settings, it often produces false positives due to its consideration of transitions from unreachable safe states to unsafe states ...
Ben Lloyd‐Roberts +4 more
wiley +1 more source
Double hashing technique in closed hashing search process [PDF]
Robbi Rahim +2 more
openalex +1 more source
SAFE‐SIoT introduces an intelligent trust classification model for Social IoT using Skip‐GRU‐Attention and feed‐forward networks. It achieves 97.5% accuracy in identifying trusted/untrusted nodes, outperforming existing models by dynamically capturing social interactions and optimizing trust evaluation in dynamic SIoT environments.
Chethan C. Raj +7 more
wiley +1 more source
Flexible Packet Matching with Single Double Cuckoo Hash
Gil Levy +2 more
openalex +2 more sources

