Results 131 to 140 of about 1,648,250 (343)

CAR:a P2P content addressable andauto-retrievable algorithm for MANET

open access: yesTongxin xuebao, 2011
To be directed at the unique features of mobile ad-hoc network(MANET) environment,a kind of mobile P2P(MP2P) index structure.Geographic-information-based hierarchical hash index structure(GH2I),was presented based on DHT(Distributed Hash Table).On the ...
WU Hua-feng1   +2 more
doaj   +2 more sources

CPHASH: a cache-partitioned hash table

open access: yesACM SIGPLAN Symposium on Principles & Practice of Parallel Programming, 2012
CPHash is a concurrent hash table for multicore processors. CPHash partitions its table across the caches of cores and uses message passing to transfer lookups/inserts to a partition.
Z. Metreveli   +2 more
semanticscholar   +1 more source

Surgical Approaches to Pre‐Auricular Cutaneous Squamous Cell Carcinomas Extending to the Temporal Bone

open access: yesHead &Neck, EarlyView.
ABSTRACT Background Standardized surgical approaches to advanced pre‐auricular cutaneous squamous cell carcinomas (cSCC) are lacking. Methods Fifty–four patients who underwent lateral temporal bone resection (LTBR) for pre‐auricular cSCC were grouped into “Levels” of increasing disease spread.
Michael Schachtel   +4 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices

open access: yesIET Networks, Volume 12, Issue 1, Page 1-8, January 2023., 2023
Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns.
Selvakumar Manickam, Shafiq Ul Rehman
wiley   +1 more source

Parallel Heuristic Community Detection Method Based on Node Similarity

open access: yesIEEE Access, 2019
Community structure discovery can help us better understand the capabilities and functions of the network. However, many existing methods have failed to identify nodes in communities accurately.
Qiang Zhou, Shi-Min Cai, Yi-Cheng Zhang
doaj   +1 more source

A hitchhiker's guide to single‐cell epigenomics: Methods and applications for cancer research

open access: yesInternational Journal of Cancer, EarlyView.
Abstract Genetic mutations are well known to influence tumorigenesis, tumor progression, treatment response and relapse, but the role of epigenetic variation in cancer progression is still largely unexplored. The lack of epigenetic understanding in cancer evolution is in part due to the limited availability of methods to examine such a heterogeneous ...
Marta Moreno‐Gonzalez   +2 more
wiley   +1 more source

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

Frequent Patterns Mining in DNA Sequence

open access: yesIEEE Access, 2019
As a common biological sequence, DNA sequences contain important information. The discovery of frequent patterns in DNA sequences can help to study the evolution, function and variation of genes.
Na Deng   +3 more
doaj   +1 more source

A Revisit on Deep Hashings for Large-scale Content Based Image Retrieval [PDF]

open access: yesarXiv, 2017
There is a growing trend in studying deep hashing methods for content-based image retrieval (CBIR), where hash functions and binary codes are learnt using deep convolutional neural networks and then the binary codes can be used to do approximate nearest neighbor (ANN) search.
arxiv  

Home - About - Disclaimer - Privacy