Results 121 to 130 of about 1,628,666 (344)
Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
To ensure the reliability and integrity of data in the cloud storage server, some scholars provided various data integrity auditing schemes. However, the most existing data integrity auditing schemes only support the static data and may be unsuitable for
Chenbin Zhao+4 more
doaj +1 more source
Conductive Hydrogel‐Based Neural Interfaces: From Fabrication Methods, Properties, to Applications
This review summarizes the fabrication methods, properties, and applications of conductive hydrogels in neural interfaces. Finally, the prevailing challenges and outlines of future directions in the field of conductive hydrogels for neural interfaces are provided, emphasizing the need for interdisciplinary research to address issues such as long‐term ...
Xin‐Yu Xue+10 more
wiley +1 more source
Lock-free dynamic hash tables with open addressing [PDF]
Hui Gao+2 more
openalex +1 more source
Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system
Cloud-edge healthcare system provides storage and computing functions at the hospital servers, bringing low latency for doctors and patients. However, hospital servers cannot be trusted and have limited computing resources.
Yi Li, Meiqin Tang
doaj
Fast hash table lookup using extended bloom filter [PDF]
Haoyu Song+3 more
openalex +1 more source
Efficient end-to-end learning for quantizable representations
Embedding representation learning via neural networks is at the core foundation of modern similarity based search. While much effort has been put in developing algorithms for learning binary hamming code representations for search efficiency, this still ...
Jeong, Yeonwoo, Song, Hyun Oh
core
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis+7 more
wiley +1 more source
Image encryption is an important method for protecting private data during communication. This paper proposes a novel hyperchaotic image encryption algorithm based on stochastic signal insertion and block permutation. First, the 5D hyperchaotic system is
Shuliang Sun, Yongning Guo, Ruikun Wu
doaj +1 more source
Tetris–Hashing or optimal table compression
AbstractIn this paper, we present a new method for mapping a static set of n keys, each an integer between 0 and N−1, into a hash table of size n without any collision. Our data structure requires only an additional array of n integers, each less than n, and achieves a worst-case lookup time of O(1).
Klaus Simon+2 more
openaire +2 more sources