Results 91 to 100 of about 1,756,456 (179)

A Revisit on Deep Hashings for Large-scale Content Based Image Retrieval [PDF]

open access: yesarXiv, 2017
There is a growing trend in studying deep hashing methods for content-based image retrieval (CBIR), where hash functions and binary codes are learnt using deep convolutional neural networks and then the binary codes can be used to do approximate nearest neighbor (ANN) search.
arxiv  

Lock-free dynamic hash tables with open addressing [PDF]

open access: green, 2004
Hui Gao   +2 more
openalex   +1 more source

Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system

open access: yesCyber Security and Applications, 2023
Cloud-edge healthcare system provides storage and computing functions at the hospital servers, bringing low latency for doctors and patients. However, hospital servers cannot be trusted and have limited computing resources.
Yi Li, Meiqin Tang
doaj  

Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage

open access: yesIEEE Access, 2019
To ensure the reliability and integrity of data in the cloud storage server, some scholars provided various data integrity auditing schemes. However, the most existing data integrity auditing schemes only support the static data and may be unsuitable for
Chenbin Zhao   +4 more
doaj   +1 more source

Fast hash table lookup using extended bloom filter [PDF]

open access: bronze, 2005
Haoyu Song   +3 more
openalex   +1 more source

Stealth distributed hash table [PDF]

open access: green, 2005
Andrew Brampton   +4 more
openalex   +1 more source

Longest-First Search Using Bloom Filter: Algorithm and FPGA Implementation

open access: yesIEEE Access
Due to the surge in Internet traffic and the rapid increase in forwarding table entries, achieving wire-speed packet forwarding in Internet routers demands both algorithmic enhancements and hardware innovations.
Jinsol Lee, Hyesook Lim
doaj   +1 more source

Multi-stage hashing network storage structure for intelligent routing

open access: yesDianxin kexue, 2020
Network data collection and storage are fundamental for intelligent routing control,providing massive flow data for model training and decision-making.However,as the key device in network storage system,switches have very limited memory size and design ...
Feng ZHU, Qun HUANG
doaj   +2 more sources

Data structures for set manipulation- hash table, 1986 [PDF]

open access: yes
The most important issue addressed in this thesis is the efficient implementation of hash table methods. There are credential trade-offs in a desired implement ion.

core  

Home - About - Disclaimer - Privacy