Results 91 to 100 of about 169,343 (316)

More Analysis of Double Hashing for Balanced Allocations

open access: yes, 2015
With double hashing, for a key $x$, one generates two hash values $f(x)$ and $g(x)$, and then uses combinations $(f(x) +i g(x)) \bmod n$ for $i=0,1,2,...$ to generate multiple hash values in the range $[0,n-1]$ from the initial two.
Mitzenmacher, Michael
core   +1 more source

Quantitative Imaging of Pyruvate Metabolism in a Patient With Anaplastic Thyroid Cancer

open access: yesMagnetic Resonance in Medicine, EarlyView.
ABSTRACT Purpose Magnetic resonance imaging using hyperpolarized (HP) [1‐13C]‐pyruvate enables assessment of pyruvate metabolism in vivo and offers new insight into metabolic changes in response to cancer therapy. Widely used semi‐quantitative metrics of pyruvate metabolism can be affected by physiological factors that are extrinsic to intracellular ...
James A. Bankson   +18 more
wiley   +1 more source

An In-Sight Into How Compression Dictionary Architecture Can Affect the Overall Performance in FPGAs

open access: yesIEEE Access, 2020
This paper presents a detailed analysis of various approaches to hardware implemented compression algorithm dictionaries, including our optimized method.
Matej Bartik, Tomas Benes, Pavel Kubalik
doaj   +1 more source

Linear Hashing is Awesome

open access: yes, 2016
We consider the hash function $h(x) = ((ax+b) \bmod p) \bmod n$ where $a,b$ are chosen uniformly at random from $\{0,1,\ldots,p-1\}$. We prove that when we use $h(x)$ in hashing with chaining to insert $n$ elements into a table of size $n$ the expected ...
Knudsen, Mathias Bæk Tejs
core   +1 more source

Solving for Blameless and Optimal Control Under Prioritized Safety Constraints

open access: yesOptimal Control Applications and Methods, EarlyView.
Summary of the proposed method for solving for blameless and optimal control sequences. ABSTRACT In many safety‐critical optimal control problems, users may request multiple safety constraints that are jointly infeasible due to external factors such as subsystem failures, unexpected disturbances, or fuel limitations.
Natalia Pavlasek   +3 more
wiley   +1 more source

Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks

open access: yesInternational Journal of Distributed Sensor Networks, 2010
We present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. We propose localized algorithms
Harshavardhan Sabbineni   +1 more
doaj   +1 more source

Fast distributed video deduplication via locality-sensitive hashing with similarity ranking

open access: yesEURASIP Journal on Image and Video Processing, 2019
The exponentially growing amount of video data being produced has led to tremendous challenges for video deduplication technology. Nowadays, many different deduplication approaches are being rapidly developed, but they are generally slow and their ...
Yeguang Li, Liang Hu, Ke Xia, Jie Luo
doaj   +1 more source

All‐sky assimilation impacts of the Tomorrow.io microwave sounder constellation on global weather forecasts

open access: yesQuarterly Journal of the Royal Meteorological Society, EarlyView.
Key Findings: An assimilation methodology is established for the Tomorrow.io microwave sounder (TMS) flying on CubeSats in sun‐synchronous and inclined orbits, and in all cloud scenes. The TMS has a significant impact on weather forecast lead times up to 3 days in the Tropics in a research‐quality numerical weather prediction setting, and yields water ...
Jonathan J. Guerrette   +3 more
wiley   +1 more source

Quantifying Structural Complexity, Effort, and Performance: An Early Experiment Using Network Design Tasks

open access: yesSystems Engineering, EarlyView.
ABSTRACT Structural Complexity is perceived as driving cost in system development, yet managing it effectively requires empirical understanding. This study investigates human decision‐making using a toy transportation‐style network design task, focusing on how Structural Complexity, Effort, and Performance interact. Seventy‐four participants (primarily
Alfonso Lanza   +3 more
wiley   +1 more source

CAR:a P2P content addressable andauto-retrievable algorithm for MANET

open access: yesTongxin xuebao, 2011
To be directed at the unique features of mobile ad-hoc network(MANET) environment,a kind of mobile P2P(MP2P) index structure.Geographic-information-based hierarchical hash index structure(GH2I),was presented based on DHT(Distributed Hash Table).On the ...
WU Hua-feng1   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy