Results 71 to 80 of about 2,163,207 (263)

An exponential open hashing function based on dynamical systems theory [PDF]

open access: yes, 2012
In this paper an efficient open addressing hash function called exponential hashing is developed using concepts from dynamical systems theory and number theory.
Abdallah, Chaouki T.   +2 more
core   +1 more source

GPERF : a perfect hash function generator [PDF]

open access: yes, 1992
gperf is a widely available perfect hash function generator written in C++. It automates a common system software operation: keyword recognition. gperf translates an n element user-specified keyword list keyfile into source code containing a k element ...
Schmidt, Douglas C., Suda, Tatsuya
core  

Hashing based Answer Selection

open access: yes, 2019
Answer selection is an important subtask of question answering (QA), where deep models usually achieve better performance. Most deep models adopt question-answer interaction mechanisms, such as attention, to get vector representations for answers.
Li, Wu-Jun, Xu, Dong
core   +1 more source

Bat algorithm based on kinetic adaptation and elite communication for engineering problems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Bat algorithm, a metaheuristic optimization technique inspired by the foraging behaviour of bats, has been employed to tackle optimization problems. Known for its ease of implementation, parameter tunability, and strong global search capabilities, this algorithm finds application across diverse optimization problem domains. However, in the
Chong Yuan   +6 more
wiley   +1 more source

A Formula That Generates Hash Collisions [PDF]

open access: yesarXiv, 2018
We present an explicit formula that produces hash collisions for the Merkle-Damg{\aa}rd construction. The formula works for arbitrary choice of message block and irrespective of the standardized constants used in hash functions, although some padding schemes may cause the formula to fail.
arxiv  

Pottery Making in the First Oases: Comparison Between Bat and Bisya Domestic and Tower Assemblages

open access: yesArabian Archaeology and Epigraphy, EarlyView.
ABSTRACT The earliest known significant pottery production in Oman appears in the first oases of the Hajar mountains southern foothills during the Umm an‐Nar period (ca. 2700–2000 bc) of the third millennium bc. Despite the history of ceramic research in southeast Arabia, the modalities of the establishment and organisation of this craft are little ...
Jennifer Swerida, Mathilde Jean
wiley   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

The Art of Crypto Currencies: A Comprehensive Analysis of Popular Crypto Currencies

open access: yes, 2016
Crypto Currencies have recently gained enormous popularity amongst the general public. With each passing day, more and more companies are radically accepting crypto cur-rencies in their payment systems, paving way for an economic revolution.
Farooq, Sameet, Hameed, Sufian
core   +1 more source

Arithmetic Progression Hypergraphs: Examining the Second Moment Method [PDF]

open access: yesarXiv, 2017
In many data structure settings, it has been shown that using "double hashing" in place of standard hashing, by which we mean choosing multiple hash values according to an arithmetic progression instead of choosing each hash value independently, has asymptotically negligible difference in performance.
arxiv  

Deformed tiling and blending: application to the correction of distortions implied by texture mapping

open access: yesComputer Graphics Forum, EarlyView.
Abstract The prevailing model in virtual 3D scenes is a 3D surface, which a texture is mapped onto, through a parameterization from the texture plane. We focus on accounting for the parameterization during the texture creation process, to control the deformations and remove the cuts induced by the mapping.
Q. Wendling, J. Ravaglia, B. Sauvage
wiley   +1 more source

Home - About - Disclaimer - Privacy