Results 191 to 200 of about 1,648,250 (343)
Data structure for representing a graph: combination of linked list and hash table
Maxim A. Kolosovskiy
openalex +2 more sources
Leveraging Caches to Accelerate Hash Tables and Memoization [PDF]
Guowei Zhang, Daniel Sánchez
openalex +1 more source
The assembly guide device designed in our study could accurately locate the tunnel path. The concentric circle sliding arc was designed to make the guiding angle adjustable and matching the various drilling angles. The center of the concentric arc coincides with the midpoint of the hook, which could ensure the preset tunnel path pass through the ...
Hongtao Zhang+6 more
wiley +1 more source
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs. [PDF]
Janakiraman S+5 more
europepmc +1 more source
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley +1 more source
Hyperchaotic hashing: a chaotic hash function based on 2D linear cross-coupled map with parallel feedback structure. [PDF]
Xing H, Min R, Li S, Yang Z, Yang Y.
europepmc +1 more source
Non‐participation in smartphone data collection using research apps
Abstract Research apps allow to administer survey questions and passively collect smartphone data, thus providing rich information on individual and social behaviours. Agreeing to this novel form of data collection requires multiple consent steps, and little is known about the effect of non‐participation. We invited 4,293 Android smartphone owners from
Florian Keusch+5 more
wiley +1 more source
Secure gray image sharing framework with adaptive key generation using image digest. [PDF]
Nithya C+7 more
europepmc +1 more source
Efficient implementation of sets and multisets in R using hash tables
Giacomo Ceoldo, Ernst C. Wit
openalex +2 more sources