Results 41 to 50 of about 170,509 (285)
Optimizing Ranking Measures for Compact Binary Code Learning [PDF]
Hashing has proven a valuable tool for large-scale information retrieval. Despite much success, existing hashing methods optimize over simple objectives such as the reconstruction error or graph Laplacian related loss functions, instead of the ...
Lin, Guosheng +2 more
core +2 more sources
Trigonometric words ranking model for spam message classification
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi +7 more
wiley +1 more source
Research of a Scheduling Optimization algorithm based on Hash Adapter
The performance of hash-based Scheduling optimization algorithm for network flow cannot be bounded under the worst-case because of hash conflicts. To make up for the shortage of the above algorithm, a multiple-hash algorithm based on counting Hash ...
Yang Wenchuan, Fu Zhen, Zuo Wen
doaj +1 more source
Finding succinct ordered minimal perfect hashing functions [PDF]
An ordered minimal perfect hash table is one in which no collisions occur among a predefined set of keys, no space is unused, and the data are placed in the table in order. A new method for creating ordered minimal perfect hashing functions is presented.
Hirschberg, Daniel S., Seiden, Steven S.
core
Hashing with binary autoencoders
An attractive approach for fast search in image databases is binary hashing, where each high-dimensional, real-valued image is mapped onto a low-dimensional, binary vector and the search is done in this binary space.
Carreira-Perpiñán, Miguel Á. +1 more
core +1 more source
Objective The goal was to assess the diagnostic performance of three novel autoantibodies (NA) for Sjögren's disease (SjD) by comparing NA prevalence in patients with SjD, other autoimmune rheumatic diseases (ARDs), nonspecific chronic sialadenitis (CS), and controls.
Chadwick R. Johr +5 more
wiley +1 more source
Robust Hashing Based on Quaternion Gyrator Transform for Image Authentication
Image hashing is one of the most effective methods in many image processing applications including image recognition or authentication, tampering detection, image retrieval, etc.
Junlin Ouyang, Xiao Zhang, Xingzi Wen
doaj +1 more source
A Cross-Modal Hash Retrieval Method with Fused Triples
Due to the fast retrieval speed and low storage cost, cross-modal hashing has become the primary method for cross-modal retrieval. Since the emergence of deep cross-modal hashing methods, cross-modal retrieval significantly improved.
Wenxiao Li +6 more
doaj +1 more source
More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function
We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$.
Hayashi, Masahito, Tsurumaru, Toyohiro
core +1 more source
Compression‐Tension‐Asymmetry and Stiffness Nonlinearity of Collagen‐Matrigel Composite Hydrogels
Self‐assembled collagen hydrogel matrices are widely used in tissue engineering applications. These matrices stiffen and contract laterally under tension due to fiber alignment and soften and collapse under compression due to fiber buckling. It is demonstrated that filler materials, such as Matrigel, linearize the mechanical behavior of collagen ...
David Böhringer +9 more
wiley +1 more source

