Results 11 to 20 of about 275,015 (197)
We present a simple and efficient dictionary with worst case constant lookup time, equaling the theoretical performance of the classic dynamic perfect hashing scheme of Dietzfelbinger et al. (<em>Dynamic perfect hashing: Upper and lower bounds. SIAM J. Comput., 23(4):738-761, 1994</em>).
Pagh, Rasmus, Rodler, Flemming Friche
openaire +2 more sources
Architectural scheme of a multi-blockchain in the Agricultural field [PDF]
The blockchain represents structured and shared data. Instantly, it is a modern method of distributed databases controlled by a group of individuals. The goal is to store information, create a digital ledger of data, and dispatch them to each network ...
El Mane Adil +3 more
doaj +1 more source
A Robust Security Architecture for SDN-Based 5G Networks
5G is the latest generation of cellular mobile communications. Due to its significant advantage in high data rate, reduced latency and massive device connectivity, the 5G network plays a vital role in today’s commercial telecommunications networks.
Jiaying Yao +3 more
doaj +1 more source
From Image Hashing to Video Hashing [PDF]
Perceptual hashing is a technique for content identification and authentication. In this work, a frame hash based video hash construction framework is proposed. This approach reduces a video hash design to an image hash design, so that the performance of the video hash can be estimated without heavy simulation.
Weng, Li, Preneel, Bart
openaire +2 more sources
Temporal Characteristics in Detecting Imminent Collision Events on Linear Trajectories
Previous research (Andersen & Kim, 2001) has shown that a linear trajectory collision event is specified by objects that expand and maintain a constant bearing (the object projected location in the visual field).
Rui Ni, Yan Zhuo, Jennifer Teves
doaj +1 more source
MIHash: Online Hashing with Mutual Information [PDF]
Learning-based hashing methods are widely used for nearest neighbor retrieval, and recently, online hashing methods have demonstrated good performance-complexity trade-offs by learning hash functions from streaming data. In this paper, we first address a
Bargal, Sarah Adel +3 more
core +1 more source
DETEKSI PLAGIASI DOKUMEN SKRIPSI MAHASISWA MENGGUNAKAN METODE N-GRAMS DAN WINNOWING
Salah satu tantangan dalam bidang akademik adalah mencegah maraknya aktivitas plagiarisme. Salah satu cara yang bisa dilakukan adalah dengan melakukan deteksi dini plagiasi terhadap karya mahasiswa terutama skripsi. Penerapan deteksi indikasi plagiarisme
Fitri Ratna Ning Wulan +2 more
doaj +1 more source
Robust Speech Hashing for Digital Audio Forensics
The verification of the integrity and authenticity of multimedia content is an essential task in the forensic field, in order to make digital evidence admissible. The main objective is to establish whether the multimedia content has been manipulated with
Diego Renza +2 more
doaj +1 more source
This review explores how Blood’s Will: Speculative Fiction, Existence, and Inquiry of Currere effectively utilizes the process of currere as a tool for inquiry as well as an educational experience.
Peaches Hash
doaj +1 more source
Linear time Constructions of some $d$-Restriction Problems [PDF]
We give new linear time globally explicit constructions for perfect hash families, cover-free families and separating hash ...
Bshouty, Nader H.
core +1 more source

