Results 51 to 60 of about 275,015 (197)
Efficient computation of hashes [PDF]
The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel ...
+16 more
core +3 more sources
AbstractWe define a family of functions F from a domain U to a range R to be dispersing if for every set S ⊆ U of a certain size and random h ∈ F, the expected value of ∣S∣ – ∣h[S]∣ is not much larger than the expectation if h had been chosen at random from the set of all functions from U to R.We give near‐optimal upper and lower bounds on the size of ...
openaire +2 more sources
A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption
Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on.
Aswin Wibisurya, Timothy Yudi Adinugroho
doaj +1 more source
EGA: An Efficient GPU Accelerated Groupby Aggregation Algorithm
With the exponential growth of big data, efficient groupby aggregation (GA) has become critical for real-time analytics across industries. GA is a key method for extracting valuable information.
Zhe Wang, Yao Shen, Zhou Lei
doaj +1 more source
An image filtering method for dataset production
To address the issue of the lack of specialized data filtering algorithms for dataset production, we proposed an image filtering algorithm. Using feature fusion methods to improve discrete wavelet transform algorithm (DWT) and enhance the robustness of ...
Ling Li, Dan He , Cheng Zhang
doaj +1 more source
Density Sensitive Hashing [PDF]
Nearest neighbor search is a fundamental problem in various research fields like machine learning, data mining and pattern recognition. Recently, hashing-based approaches, for example, locality sensitive hashing (LSH), are proved to be effective for scalable high dimensional nearest neighbor search. Many hashing algorithms found their theoretic root in
Zhongming, Jin +3 more
openaire +2 more sources
مشكلات أسر الشهداء والمصابين السعوديين وسبل الحد منها من منظور الخدمة الاجتماعية: دراسة ميدانية
هدفت الدراسة إلى التعرف على المشكلات التي تواجه أسر الشهداء السعوديين في جميع الأنساق (الصغرى والوسطى والكبرى) ومدى كفاية الخدمات المطلوبة لهم من المسؤولين والصعوبات التي تعترضها مع وضع تصور مقترح من منظور الخدمة الاجتماعية لمواجهتها وقد استخدمت الدراسة ...
Hash Salem Aljohani
doaj +1 more source
Learning to Hash-tag Videos with Tag2Vec
User-given tags or labels are valuable resources for semantic understanding of visual media such as images and videos. Recently, a new type of labeling mechanism known as hash-tags have become increasingly popular on social media sites. In this paper, we
Narayanan, PJ +3 more
core +1 more source
Experiencias del Hash en la vida informática
Este artículo resalta el proceso de generación de llaves codificadas y, los métodos Hash asociados al mismo y las colisiones que ocurren tras dicha transformación. La tecnología dentro de este contexto está orientada primordialmente a buscar diferentes
Maxs Barrera +3 more
doaj +1 more source
Natural Hazard Overview: Wind [PDF]
The National Centre for Resilience supported the Met Office and their partner organisations in the production of a set of Natural Hazard Overviews. This factsheet is one of the set commissioned to meet a requirement for Scotland-specific information ...
make_name_string expected hash reference
core

