Results 91 to 100 of about 169,343 (316)
More Analysis of Double Hashing for Balanced Allocations
With double hashing, for a key $x$, one generates two hash values $f(x)$ and $g(x)$, and then uses combinations $(f(x) +i g(x)) \bmod n$ for $i=0,1,2,...$ to generate multiple hash values in the range $[0,n-1]$ from the initial two.
Mitzenmacher, Michael
core +1 more source
Quantitative Imaging of Pyruvate Metabolism in a Patient With Anaplastic Thyroid Cancer
ABSTRACT Purpose Magnetic resonance imaging using hyperpolarized (HP) [1‐13C]‐pyruvate enables assessment of pyruvate metabolism in vivo and offers new insight into metabolic changes in response to cancer therapy. Widely used semi‐quantitative metrics of pyruvate metabolism can be affected by physiological factors that are extrinsic to intracellular ...
James A. Bankson +18 more
wiley +1 more source
An In-Sight Into How Compression Dictionary Architecture Can Affect the Overall Performance in FPGAs
This paper presents a detailed analysis of various approaches to hardware implemented compression algorithm dictionaries, including our optimized method.
Matej Bartik, Tomas Benes, Pavel Kubalik
doaj +1 more source
We consider the hash function $h(x) = ((ax+b) \bmod p) \bmod n$ where $a,b$ are chosen uniformly at random from $\{0,1,\ldots,p-1\}$. We prove that when we use $h(x)$ in hashing with chaining to insert $n$ elements into a table of size $n$ the expected ...
Knudsen, Mathias Bæk Tejs
core +1 more source
Solving for Blameless and Optimal Control Under Prioritized Safety Constraints
Summary of the proposed method for solving for blameless and optimal control sequences. ABSTRACT In many safety‐critical optimal control problems, users may request multiple safety constraints that are jointly infeasible due to external factors such as subsystem failures, unexpected disturbances, or fuel limitations.
Natalia Pavlasek +3 more
wiley +1 more source
Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks
We present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. We propose localized algorithms
Harshavardhan Sabbineni +1 more
doaj +1 more source
Fast distributed video deduplication via locality-sensitive hashing with similarity ranking
The exponentially growing amount of video data being produced has led to tremendous challenges for video deduplication technology. Nowadays, many different deduplication approaches are being rapidly developed, but they are generally slow and their ...
Yeguang Li, Liang Hu, Ke Xia, Jie Luo
doaj +1 more source
Key Findings: An assimilation methodology is established for the Tomorrow.io microwave sounder (TMS) flying on CubeSats in sun‐synchronous and inclined orbits, and in all cloud scenes. The TMS has a significant impact on weather forecast lead times up to 3 days in the Tropics in a research‐quality numerical weather prediction setting, and yields water ...
Jonathan J. Guerrette +3 more
wiley +1 more source
ABSTRACT Structural Complexity is perceived as driving cost in system development, yet managing it effectively requires empirical understanding. This study investigates human decision‐making using a toy transportation‐style network design task, focusing on how Structural Complexity, Effort, and Performance interact. Seventy‐four participants (primarily
Alfonso Lanza +3 more
wiley +1 more source
CAR:a P2P content addressable andauto-retrievable algorithm for MANET
To be directed at the unique features of mobile ad-hoc network(MANET) environment,a kind of mobile P2P(MP2P) index structure.Geographic-information-based hierarchical hash index structure(GH2I),was presented based on DHT(Distributed Hash Table).On the ...
WU Hua-feng1 +2 more
doaj +2 more sources

