Results 131 to 140 of about 65,979 (233)
Dynamic External Hashing: The Limit of Buffering [PDF]
Hash tables are one of the most fundamental data structures in computer science, in both theory and practice. They are especially useful in external memory, where their query performance approaches the ideal cost of just one disk access. Knuth gave an elegant analysis showing that with some simple collision resolution strategies such as linear probing ...
arxiv
ABSTRACT Blockchain (BC) technology is widely believed to be the next disruptive technology that can address challenges in higher education institutions (HEIs) and support resilient strategies. This study aims to contribute to the literature and inform policymakers about BC's capability and potential in HE by examining enablers, barriers and contextual
Buddhi Pathak+2 more
wiley +1 more source
ABSTRACT Blockchain (BC) systems are increasingly used by consortia to monitor ex‐post opportunism in food supply chains. BC systems differ for BC technical characteristics, complementary technologies, and organizational tools. Yet, little is empirically known about the link between different BC system designs and the context where they are implemented
Pamela Danese, Pietro Romano
wiley +1 more source
Privacy Protection System of EMR Based on Hash Chain [PDF]
Dang Ying+6 more
openalex +1 more source
A deep learning‐based method Siamese transformer reaction pair (STRP) prediction is presented for identifying important pathways in untargeted LC‐MS/MS metabolomics. STRP accurately predicts metabolic reaction pairs from known metabolites and tandem mass spectra of unannotated metabolic features, which enhance the utility of untargeted metabolomics ...
Han Bao+7 more
wiley +1 more source
Review on Information Fusion‐Based Data Mining for Improving Complex Anomaly Detection
The performance of information fusion techniques within the framework of various anomaly detection methods applied in sensor data mining. ABSTRACT Anomaly predicated upon multiple distributed hybrid sensors frequently uses hybrid approaches, integrating techniques derived from statistical analysis, probability, data mining, machine learning, deep ...
Sorin‐Claudiu Moldovan+1 more
wiley +1 more source
On-Chain Video Copy Detection Based on Swin-Transformer and Deep Hashing [PDF]
Wenqian Shang, Xintao Liu, Miaoran Song
openalex +1 more source
A Mobile Ad Hoc Network Public Key Encryption Algorithm Based on Hash-Chain
Feng Wang, Shang Qing-wei, Ke Cao
openalex +1 more source
Key Distribution using Double Keyed-hash Chains for Wireless Sensor Networks
Jianmin Zhang, Jianwei Tan, Jian Li
openalex +1 more source