Results 11 to 20 of about 275,015 (197)

Cuckoo Hashing

open access: yesBRICS Report Series, 2001
We present a simple and efficient dictionary with worst case constant lookup time, equaling the theoretical performance of the classic dynamic perfect hashing scheme of Dietzfelbinger et al. (<em>Dynamic perfect hashing: Upper and lower bounds. SIAM J. Comput., 23(4):738-761, 1994</em>).
Pagh, Rasmus, Rodler, Flemming Friche
openaire   +2 more sources

Architectural scheme of a multi-blockchain in the Agricultural field [PDF]

open access: yesE3S Web of Conferences, 2021
The blockchain represents structured and shared data. Instantly, it is a modern method of distributed databases controlled by a group of individuals. The goal is to store information, create a digital ledger of data, and dispatch them to each network ...
El Mane Adil   +3 more
doaj   +1 more source

A Robust Security Architecture for SDN-Based 5G Networks

open access: yesFuture Internet, 2019
5G is the latest generation of cellular mobile communications. Due to its significant advantage in high data rate, reduced latency and massive device connectivity, the 5G network plays a vital role in today’s commercial telecommunications networks.
Jiaying Yao   +3 more
doaj   +1 more source

From Image Hashing to Video Hashing [PDF]

open access: yes, 2010
Perceptual hashing is a technique for content identification and authentication. In this work, a frame hash based video hash construction framework is proposed. This approach reduces a video hash design to an image hash design, so that the performance of the video hash can be estimated without heavy simulation.
Weng, Li, Preneel, Bart
openaire   +2 more sources

Temporal Characteristics in Detecting Imminent Collision Events on Linear Trajectories

open access: yesi-Perception, 2011
Previous research (Andersen & Kim, 2001) has shown that a linear trajectory collision event is specified by objects that expand and maintain a constant bearing (the object projected location in the visual field).
Rui Ni, Yan Zhuo, Jennifer Teves
doaj   +1 more source

MIHash: Online Hashing with Mutual Information [PDF]

open access: yes, 2017
Learning-based hashing methods are widely used for nearest neighbor retrieval, and recently, online hashing methods have demonstrated good performance-complexity trade-offs by learning hash functions from streaming data. In this paper, we first address a
Bargal, Sarah Adel   +3 more
core   +1 more source

DETEKSI PLAGIASI DOKUMEN SKRIPSI MAHASISWA MENGGUNAKAN METODE N-GRAMS DAN WINNOWING

open access: yesSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2018
Salah satu tantangan dalam bidang akademik adalah mencegah maraknya aktivitas plagiarisme. Salah satu cara yang bisa dilakukan adalah dengan melakukan deteksi dini plagiasi terhadap karya mahasiswa terutama skripsi. Penerapan deteksi indikasi plagiarisme
Fitri Ratna Ning Wulan   +2 more
doaj   +1 more source

Robust Speech Hashing for Digital Audio Forensics

open access: yesApplied Sciences, 2019
The verification of the integrity and authenticity of multimedia content is an essential task in the forensic field, in order to make digital evidence admissible. The main objective is to establish whether the multimedia content has been manipulated with
Diego Renza   +2 more
doaj   +1 more source

Vampiric Inquiry, or A Review of Blood’s Will: Speculative Fiction, Existence, and Inquiry of Currere

open access: yesJournal of Curriculum Theorizing, 2021
This review explores how Blood’s Will: Speculative Fiction, Existence, and Inquiry of Currere effectively utilizes the process of currere as a tool for inquiry as well as an educational experience.
Peaches Hash
doaj   +1 more source

Linear time Constructions of some $d$-Restriction Problems [PDF]

open access: yes, 2014
We give new linear time globally explicit constructions for perfect hash families, cover-free families and separating hash ...
Bshouty, Nader H.
core   +1 more source

Home - About - Disclaimer - Privacy