Results 91 to 100 of about 1,756,456 (179)
A Revisit on Deep Hashings for Large-scale Content Based Image Retrieval [PDF]
There is a growing trend in studying deep hashing methods for content-based image retrieval (CBIR), where hash functions and binary codes are learnt using deep convolutional neural networks and then the binary codes can be used to do approximate nearest neighbor (ANN) search.
arxiv
Lock-free dynamic hash tables with open addressing [PDF]
Hui Gao+2 more
openalex +1 more source
Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system
Cloud-edge healthcare system provides storage and computing functions at the hospital servers, bringing low latency for doctors and patients. However, hospital servers cannot be trusted and have limited computing resources.
Yi Li, Meiqin Tang
doaj
Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
To ensure the reliability and integrity of data in the cloud storage server, some scholars provided various data integrity auditing schemes. However, the most existing data integrity auditing schemes only support the static data and may be unsuitable for
Chenbin Zhao+4 more
doaj +1 more source
Fast hash table lookup using extended bloom filter [PDF]
Haoyu Song+3 more
openalex +1 more source
Longest-First Search Using Bloom Filter: Algorithm and FPGA Implementation
Due to the surge in Internet traffic and the rapid increase in forwarding table entries, achieving wire-speed packet forwarding in Internet routers demands both algorithmic enhancements and hardware innovations.
Jinsol Lee, Hyesook Lim
doaj +1 more source
ReCord: A Distributed Hash Table with Recursive Structure [PDF]
Jianyang Zeng, Wen-Jing Hsu
openalex +1 more source
Multi-stage hashing network storage structure for intelligent routing
Network data collection and storage are fundamental for intelligent routing control,providing massive flow data for model training and decision-making.However,as the key device in network storage system,switches have very limited memory size and design ...
Feng ZHU, Qun HUANG
doaj +2 more sources
Data structures for set manipulation- hash table, 1986 [PDF]
The most important issue addressed in this thesis is the efficient implementation of hash table methods. There are credential trade-offs in a desired implement ion.
core