Results 131 to 140 of about 65,979 (233)

Dynamic External Hashing: The Limit of Buffering [PDF]

open access: yesarXiv, 2008
Hash tables are one of the most fundamental data structures in computer science, in both theory and practice. They are especially useful in external memory, where their query performance approaches the ideal cost of just one disk access. Knuth gave an elegant analysis showing that with some simple collision resolution strategies such as linear probing ...
arxiv  

Institutional Environment and the Use of Blockchain Technology: Exploring the Context and Conditions of Using Blockchain in the Higher Education Institutions

open access: yesHigher Education Quarterly, Volume 79, Issue 3, July 2025.
ABSTRACT Blockchain (BC) technology is widely believed to be the next disruptive technology that can address challenges in higher education institutions (HEIs) and support resilient strategies. This study aims to contribute to the literature and inform policymakers about BC's capability and potential in HE by examining enablers, barriers and contextual
Buddhi Pathak   +2 more
wiley   +1 more source

Blockchain Systems in Food Supply Chains: An Interpretation Through the Lens of Agency and Technology–Organization–Environment Theories

open access: yesJournal of Business Logistics, Volume 46, Issue 3, July 2025.
ABSTRACT Blockchain (BC) systems are increasingly used by consortia to monitor ex‐post opportunism in food supply chains. BC systems differ for BC technical characteristics, complementary technologies, and organizational tools. Yet, little is empirically known about the link between different BC system designs and the context where they are implemented
Pamela Danese, Pietro Romano
wiley   +1 more source

Privacy Protection System of EMR Based on Hash Chain [PDF]

open access: gold, 2017
Dang Ying   +6 more
openalex   +1 more source

Deciphering Important Metabolic Pathways through Reaction Pair Prediction with a Siamese Transformer Network

open access: yesChemistry–Methods, Volume 5, Issue 6, June 2025.
A deep learning‐based method Siamese transformer reaction pair (STRP) prediction is presented for identifying important pathways in untargeted LC‐MS/MS metabolomics. STRP accurately predicts metabolic reaction pairs from known metabolites and tandem mass spectra of unannotated metabolic features, which enhance the utility of untargeted metabolomics ...
Han Bao   +7 more
wiley   +1 more source

Review on Information Fusion‐Based Data Mining for Improving Complex Anomaly Detection

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 2, June 2025.
The performance of information fusion techniques within the framework of various anomaly detection methods applied in sensor data mining. ABSTRACT Anomaly predicated upon multiple distributed hybrid sensors frequently uses hybrid approaches, integrating techniques derived from statistical analysis, probability, data mining, machine learning, deep ...
Sorin‐Claudiu Moldovan   +1 more
wiley   +1 more source

Home - About - Disclaimer - Privacy