Results 71 to 80 of about 275,015 (197)

Tight Thresholds for Cuckoo Hashing via XORSAT

open access: yes, 2010
We settle the question of tight thresholds for offline cuckoo hashing. The problem can be stated as follows: we have n keys to be hashed into m buckets each capable of holding a single key.
Dietzfelbinger, Martin   +5 more
core   +2 more sources

Multi-Granularity Semantic Information Integration Graph for Cross-Modal Hash Retrieval

open access: yesIEEE Access
With the development of intelligent collection technology and popularization of intelligent terminals, multi-source heterogeneous data are growing rapidly.
Zhichao Han   +3 more
doaj   +1 more source

Hashing

open access: yes
Citation: 'hashing' in the IUPAC Compendium of Chemical Terminology, 5th ed.; International Union of Pure and Applied Chemistry; 2025. Online version 5.0.0, 2025. 10.1351/goldbook.11454 • License: The IUPAC Gold Book is licensed under Creative Commons Attribution-ShareAlike CC BY-SA 4.0 International for individual terms.
Roberto Mantaci, Jean-Baptiste Yunès
  +4 more sources

Natural Hazard Overview: Flooding [PDF]

open access: yes, 2018
The National Centre for Resilience supported the Met Office and their partner organisations in the production of a set of Natural Hazard Overviews. This factsheet is one of the set commissioned to meet a requirement for Scotland-specific information ...
make_name_string expected hash reference
core  

Key recycling in authentication

open access: yes, 2014
In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad.
Portmann, Christopher
core   +1 more source

Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing [PDF]

open access: yes, 2014
Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, $A$ and $B$, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the natural way, by using multiplication of elements in the (semi ...
Bromberg, Lisa   +2 more
core   +1 more source

Função ‘hash’ e a integridade da prova digital

open access: yesRevista Brasileira de Direito Processual Penal
O artigo aborda a função 'hash' como ferramenta para garantir a integridade de dados digitais, examinando seus fundamentos, limitações e aplicação no contexto da cadeia de custódia de provas digitais. A despeito das previsões do Código de Processo Penal,
Yuri Fisberg
doaj   +1 more source

Illusory Centrifugal Motion Direction Observed in Brief Stimuli: Psychophysics and Energy Model

open access: yesi-Perception, 2011
All stationary stimuli of fixed duration have motion energy and the amount of motion energy increases with decreasing duration. Consequently, perception of motion direction could be biased if the readout mechanisms are unbalanced.
Ruyuan Zhang, Duje Tadin
doaj   +1 more source

An Adaptive and Asymmetric Residual Hash for Fast Image Retrieval

open access: yesIEEE Access, 2019
Hashing algorithm has attracted great attention in recent years. In order to improve the query speed and retrieval accuracy, this paper proposes an adaptive and asymmetric residual hash (AASH) algorithm based on residual hash, integrated learning, and ...
Shuli Cheng, Liejun Wang, Anyu Du
doaj   +1 more source

A Formula That Generates Hash Collisions

open access: yes, 2018
We present an explicit formula that produces hash collisions for the Merkle-Damg{\aa}rd construction. The formula works for arbitrary choice of message block and irrespective of the standardized constants used in hash functions, although some padding ...
Brockmann, Andrew
core  

Home - About - Disclaimer - Privacy