Results 31 to 40 of about 10,943 (115)
Dynamic Integer Sets with Optimal Rank, Select, and Predecessor Search
We present a data structure representing a dynamic set S of w-bit integers on a w-bit word RAM. With |S|=n and w > log n and space O(n), we support the following standard operations in O(log n / log w) time: - insert(x) sets S = S + {x}.
Patrascu, Mihai, Thorup, Mikkel
core +1 more source
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
GPERF : a perfect hash function generator [PDF]
gperf is a widely available perfect hash function generator written in C++. It automates a common system software operation: keyword recognition. gperf translates an n element user-specified keyword list keyfile into source code containing a k element ...
Schmidt, Douglas C., Suda, Tatsuya
core
Remote Sensing Data Assimilation With a Chained Hydrologic‐Hydraulic Model for Flood Forecasting
Abstract Effective flood risk management requires reliable forecasts with extended lead times to enable the implementation of cost‐effective and timely measures. In this study, we present a chained hydrologic‐hydraulic modeling framework designed for effective near‐real‐time flood forecasting. The system integrates runoff predictions from a large‐scale
T. H. Nguyen +6 more
wiley +1 more source
Abstract In pothole‐dominated catchments, such as those in the Prairie Pothole Region (PPR), potholes strongly influence catchment hydrologic behavior through complex and dynamic fill–spill–connection mechanisms. This complexity—combined with the predominance of ungauged catchments and the lack of high‐resolution pothole inventories—poses challenges ...
Javad Rahmani +2 more
wiley +1 more source
A schema for cryptographic keys generation using hybrid biometrics [PDF]
Biometric identifiers refer to unique physical properties or behavioural attributes of individuals. Some of the well known biometric identifiers are voice, finger prints, retina or iris, facial structure etc. In our daily interaction with others directly
Donelan, Helen +2 more
core
Vision‐Guided Surgical Navigation Using Computer Vision for Dynamic Intraoperative Imaging Updates
ABSTRACT Background Residual disease after endoscopic sinus surgery (ESS) contributes to poor outcomes and revision surgery. Image‐guided surgery systems cannot dynamically reflect intraoperative changes. We propose a sensorless, video‐based method for intraoperative CT updating using neural radiance fields (NeRF), a deep learning algorithm used to ...
Jeremy Ruthberg +7 more
wiley +1 more source
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
ABSTRACT Frontline service workers are crucial to service delivery and have been a long‐standing focus of research, with scholars and practitioners alike maintaining an interest in their effective management. As technology increasingly transforms this context, the way in which managers in service organizations communicate with frontline workers has ...
Alexandra Budjanovcanin, Wei‐Ning Yang
wiley +1 more source
A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security. [PDF]
Wang Q +5 more
europepmc +1 more source

