Results 61 to 70 of about 275,015 (197)

On the Insertion Time of Cuckoo Hashing

open access: yes, 2013
Cuckoo hashing is an efficient technique for creating large hash tables with high space utilization and guaranteed constant access times. There, each item can be placed in a location given by any one out of k different hash functions.
Fountoulakis, Nikolaos   +2 more
core   +1 more source

A Zero-Trust Multi-Processor Reporter-Verifier Design of Edge Devices for Firmware Authenticity in Internet of Things and Blockchain Applications

open access: yesJournal of Sensor and Actuator Networks
Firmware authenticity and integrity during upgrades are critical security factors in Internet of Things (IoT) applications in the age of edge artificial intelligence (AI). Data from IoT applications are vital for business decisions.
Ananda Maiti, Alexander A. Kist
doaj   +1 more source

Hash Embeddings for Efficient Word Representations

open access: yes, 2017
We present hash embeddings, an efficient method for representing words in a continuous vector form. A hash embedding may be seen as an interpolation between a standard word embedding and a word embedding created using a random hash function (the hashing ...
Hansen, Jonas Meinertz   +2 more
core  

Risks of Bitcoin Virtual Currency

open access: yesCommunications, 2015
Bitcoin, digital money got into focus after the Mt Gox crash. It uses P2P interaction where an owner transfers the electronic coin to the next owner signing and adding a hash of the previous transaction and the public key of the next owner.
Zoran Cekerevac   +3 more
doaj   +1 more source

Online Adaptive Supervised Hashing for Large-Scale Cross-Modal Retrieval

open access: yesIEEE Access, 2020
In recent years, with the continuous growth of multimedia data on the Internet, multimodal hashing has attracted increasing attention for its efficiency in large-scale cross-modal retrieval.
Ruoqi Su   +4 more
doaj   +1 more source

Comparison on Search Failure between Hash Tables and a Functional Bloom Filter

open access: yesApplied Sciences, 2020
Hash-based data structures have been widely used in many applications. An intrinsic problem of hashing is collision, in which two or more elements are hashed to the same value. If a hash table is heavily loaded, more collisions would occur. Elements that
Hayoung Byun, Hyesook Lim
doaj   +1 more source

ASIC-Resistance of Multi-Hash Proof-of-Work Mechanisms for Blockchain Consensus Protocols

open access: yesIEEE Access, 2018
Blockchain technology rapidly gained popularity based on its open and decentralized operation. Consensus protocol is the core mechanism of a blockchain network that securely maintains the distributed ledger from possible attacks from adversaries.
Hyungmin Cho
doaj   +1 more source

Finding succinct ordered minimal perfect hashing functions [PDF]

open access: yes, 1992
An ordered minimal perfect hash table is one in which no collisions occur among a predefined set of keys, no space is unused, and the data are placed in the table in order. A new method for creating ordered minimal perfect hashing functions is presented.
Hirschberg, Daniel S., Seiden, Steven S.
core  

Home - About - Disclaimer - Privacy