Results 81 to 90 of about 2,144,321 (256)

Hashing based Answer Selection

open access: yes, 2019
Answer selection is an important subtask of question answering (QA), where deep models usually achieve better performance. Most deep models adopt question-answer interaction mechanisms, such as attention, to get vector representations for answers.
Li, Wu-Jun, Xu, Dong
core   +1 more source

GPERF : a perfect hash function generator [PDF]

open access: yes, 1992
gperf is a widely available perfect hash function generator written in C++. It automates a common system software operation: keyword recognition. gperf translates an n element user-specified keyword list keyfile into source code containing a k element ...
Schmidt, Douglas C., Suda, Tatsuya
core  

A Formula That Generates Hash Collisions [PDF]

open access: yesarXiv, 2018
We present an explicit formula that produces hash collisions for the Merkle-Damg{\aa}rd construction. The formula works for arbitrary choice of message block and irrespective of the standardized constants used in hash functions, although some padding schemes may cause the formula to fail.
arxiv  

Hashing for Similarity Search: A Survey [PDF]

open access: yes, 2014
Similarity search (nearest neighbor search) is a problem of pursuing the data items whose distances to a query item are the smallest from a large database.
Ji, Jianqiu   +3 more
core  

Key Considerations on CITE‐Seq for Single‐Cell Multiomics

open access: yesPROTEOMICS, EarlyView.
ABSTRACT CITE‐Seq (Cellular Indexing of Transcriptomes and Epitopes by Sequencing) is an advanced single‐cell sequencing method to profile both gene expression and protein abundance simultaneously in individual cells using single‐cell mRNA sequencing techniques alongside antibody‐derived tags (ADTs), for protein detection.
Hye‐Wong Song   +3 more
wiley   +1 more source

Arithmetic Progression Hypergraphs: Examining the Second Moment Method [PDF]

open access: yesarXiv, 2017
In many data structure settings, it has been shown that using "double hashing" in place of standard hashing, by which we mean choosing multiple hash values according to an arithmetic progression instead of choosing each hash value independently, has asymptotically negligible difference in performance.
arxiv  

Arbuscular mycorrhizal fungi increase aleurone layer zinc concentration but reduce overall zinc bioavailability in rice grain

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Rice is a critical crop for the delivery of calories and essential micronutrients to the human diet. Biofortification of rice with zinc (Zn) and iron (Fe) aims to combat the health issues associated with “hidden hunger”. Arbuscular mycorrhizal (AM) fungi have been explored for their potential to enhance Zn and Fe uptake in rice products.
Thi Diem Nguyen   +7 more
wiley   +1 more source

Fast and Powerful Hashing using Tabulation [PDF]

open access: yesarXiv, 2015
Randomized algorithms are often enjoyed for their simplicity, but the hash functions employed to yield the desired probabilistic guarantees are often too complicated to be practical. Here we survey recent results on how simple hashing schemes based on tabulation provide unexpectedly strong guarantees.
arxiv  

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

Practical Evaluation of Lempel-Ziv-78 and Lempel-Ziv-Welch Tries

open access: yes, 2017
We present the first thorough practical study of the Lempel-Ziv-78 and the Lempel-Ziv-Welch computation based on trie data structures. With a careful selection of trie representations we can beat well-tuned popular trie data structures like Judy, m ...
A Poyias   +23 more
core   +1 more source

Home - About - Disclaimer - Privacy