Results 51 to 60 of about 275,015 (197)

Efficient computation of hashes [PDF]

open access: yes, 2014
The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel ...
  +16 more
core   +3 more sources

Dispersing hash functions

open access: yesRandom Structures & Algorithms, 2000
AbstractWe define a family of functions F from a domain U to a range R to be dispersing if for every set S ⊆ U of a certain size and random h ∈ F, the expected value of ∣S∣ – ∣h[S]∣ is not much larger than the expectation if h had been chosen at random from the set of all functions from U to R.We give near‐optimal upper and lower bounds on the size of ...
openaire   +2 more sources

A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption

open access: yesComTech, 2014
Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on.
Aswin Wibisurya, Timothy Yudi Adinugroho
doaj   +1 more source

EGA: An Efficient GPU Accelerated Groupby Aggregation Algorithm

open access: yesApplied Sciences
With the exponential growth of big data, efficient groupby aggregation (GA) has become critical for real-time analytics across industries. GA is a key method for extracting valuable information.
Zhe Wang, Yao Shen, Zhou Lei
doaj   +1 more source

An image filtering method for dataset production

open access: yesElectronic Research Archive
To address the issue of the lack of specialized data filtering algorithms for dataset production, we proposed an image filtering algorithm. Using feature fusion methods to improve discrete wavelet transform algorithm (DWT) and enhance the robustness of ...
Ling Li, Dan He , Cheng Zhang
doaj   +1 more source

Density Sensitive Hashing [PDF]

open access: yesIEEE Transactions on Cybernetics, 2014
Nearest neighbor search is a fundamental problem in various research fields like machine learning, data mining and pattern recognition. Recently, hashing-based approaches, for example, locality sensitive hashing (LSH), are proved to be effective for scalable high dimensional nearest neighbor search. Many hashing algorithms found their theoretic root in
Zhongming, Jin   +3 more
openaire   +2 more sources

مشكلات أسر الشهداء والمصابين السعوديين وسبل الحد منها من منظور الخدمة الاجتماعية: دراسة ميدانية

open access: yesArab Journal for Security Studies, 2020
هدفت الدراسة إلى التعرف على المشكلات التي تواجه أسر الشهداء السعوديين في جميع الأنساق (الصغرى والوسطى والكبرى) ومدى كفاية الخدمات المطلوبة لهم من المسؤولين والصعوبات التي تعترضها مع وضع تصور مقترح من منظور الخدمة الاجتماعية لمواجهتها وقد استخدمت الدراسة ...
Hash Salem Aljohani
doaj   +1 more source

Learning to Hash-tag Videos with Tag2Vec

open access: yes, 2016
User-given tags or labels are valuable resources for semantic understanding of visual media such as images and videos. Recently, a new type of labeling mechanism known as hash-tags have become increasingly popular on social media sites. In this paper, we
Narayanan, PJ   +3 more
core   +1 more source

Experiencias del Hash en la vida informática

open access: yesRevista de Iniciación Científica, 2018
Este artículo resalta el proceso de generación de llaves codificadas y, los métodos Hash asociados al mismo y las colisiones que ocurren tras dicha transformación. La tecnología dentro de este contexto está orientada primordialmente a buscar diferentes
Maxs Barrera   +3 more
doaj   +1 more source

Natural Hazard Overview: Wind [PDF]

open access: yes, 2018
The National Centre for Resilience supported the Met Office and their partner organisations in the production of a set of Natural Hazard Overviews. This factsheet is one of the set commissioned to meet a requirement for Scotland-specific information ...
make_name_string expected hash reference
core  

Home - About - Disclaimer - Privacy