Results 1 to 10 of about 164,829 (289)
Analysing the Performance of GPU Hash Tables for State Space Exploration [PDF]
In the past few years, General Purpose Graphics Processors (GPUs) have been used to significantly speed up numerous applications. One of the areas in which GPUs have recently led to a significant speed-up is model checking.
Nathan Cassee, Anton Wijs
doaj +21 more sources
Image Encryption Based on Hash Table Scrambling and DNA Substitution [PDF]
This paper proposes an image encryption algorithm based on hash table structure scrambling and DNA substitution. The algorithm uses the classical `scrambling-diffusion' process, and the pseudo-random sequence used in each process is generated by the ...
Xingyuan Wang, Lin Liu
doaj +2 more sources
The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits.
Akinwale, A. T., Ibharalu, F. T.
core +4 more sources
A new hash function and its use in read mapping on genome [PDF]
Mapping reads onto genomes is an indispensable step in sequencing data analysis. A widely used method to speed up mapping is to index a genome by a hash table, in which genomic positions of $k$-mers are stored in the table.
Farzaneh Salari +2 more
doaj +1 more source
DHT- and blockchain-based smart identification for video conferencing
Video conferencing applications help people communicate via the Internet and provide a significant and consistent basis for virtual meetings. However, integrity, security, identification, and authentication problems are still universal.
Morteza Alizadeh +2 more
doaj +1 more source
Research on MPP Database Connection Execution Based on Shared Storage [PDF]
In order to solve the problem of low connection efficiency after the Hash distribution table is converted into a random distribution table,a parallel connection operation algorithm for Hash tables in Massively Parallel Processor(MPP) database is ...
SUN Qingxin,LEI Yingchun,GONG Yili
doaj +1 more source
Comparison on Search Failure between Hash Tables and a Functional Bloom Filter
Hash-based data structures have been widely used in many applications. An intrinsic problem of hashing is collision, in which two or more elements are hashed to the same value. If a hash table is heavily loaded, more collisions would occur. Elements that
Hayoung Byun, Hyesook Lim
doaj +1 more source
Key Concepts, Weakness and Benchmark on Hash Table Data Structures
Most computer programs or applications need fast data structures. The performance of a data structure is necessarily influenced by the complexity of its common operations; thus, any data-structure that exhibits a theoretical complexity of amortized ...
Santiago Tapia-Fernández +2 more
doaj +1 more source
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie +5 more
doaj +1 more source
With the development of the Internet, numerous new applications have emerged, the features of which are constantly changing. It is necessary to perform application classification detection on the network traffic to monitor the changes in the applications.
Shichang Xuan +5 more
doaj +1 more source

