Results 31 to 40 of about 1,756,456 (179)
A Rolling Hash Algorithm and the Implementation to LZ4 Data Compression
LZ77 is a dictionary compression algorithm by replacing the repeating sequence with the addresses of the previous referenced data in the stream. To find out these repetition, the LZ77 encoder maintains a hashing table, which have to frequently calculate ...
Hao Jiang, Sian-Jheng Lin
doaj +1 more source
Near Perfect Hash Table for Image Databases [PDF]
In image database systems, a perfect hash table can be used to enhance the efficiency and effectiveness of the image retrieval process. In our earlier work, we have proposed heuristic algorithms to compute the minimal perfect hash table from symbolic ...
Bhatia, Sanjiv K., Sabharwal, Chaman
core +2 more sources
Time-Memory Analysis of Parallel Collision Search Algorithms
Parallel versions of collision search algorithms require a significant amount of memory to store a proportion of the points computed by the pseudo-random walks.
Monika Trimoska+2 more
doaj +1 more source
Comparison of Hash Table Performance with Open Addressing and Closed Addressing: An Empirical Study [PDF]
In this paper, we conducted empirical experiments to study the performance of hashing with a large set of data and compared the results of different collision approaches. The experiment results leaned more to closed addressing than to open addressing and
Dapeng Liu, Shaochun Xu
doaj +1 more source
DHT- and blockchain-based smart identification for video conferencing
Video conferencing applications help people communicate via the Internet and provide a significant and consistent basis for virtual meetings. However, integrity, security, identification, and authentication problems are still universal.
Morteza Alizadeh+2 more
doaj
Incremental hashing with sample selection using dominant sets [PDF]
In the world of big data, large amounts of images are available in social media, corporate and even personal collections. A collection may grow quickly as new images are generated at high rates.
Jiang, Xiaoxia+5 more
core +1 more source
Semi-supervised hash learning method with consistency-based dimensionality reduction
With the explosive growth of surveillance data, exact match queries become much more difficult for its high dimension and high volume. Owing to its good balance between the retrieval performance and the computational cost, hash learning technique is ...
Fang Lv+3 more
doaj +1 more source
On the Scalability of the GPUexplore Explicit-State Model Checker [PDF]
The use of graphics processors (GPUs) is a promising approach to speed up model checking to such an extent that it becomes feasible to instantly verify software systems during development.
Nathan Cassee, Thomas Neele, Anton Wijs
doaj +1 more source
Research of a Scheduling Optimization algorithm based on Hash Adapter
The performance of hash-based Scheduling optimization algorithm for network flow cannot be bounded under the worst-case because of hash conflicts. To make up for the shortage of the above algorithm, a multiple-hash algorithm based on counting Hash ...
Yang Wenchuan, Fu Zhen, Zuo Wen
doaj +1 more source
ESH: Design and Implementation of an Optimal Hashing Scheme for Persistent Memory
Recent advancements in memory technology have opened up a wealth of possibilities for innovation in data structures. The emergence of byte-addressable persistent memory (PM) with its impressive capacity and low latency has accelerated the adoption of PM ...
Dereje Regassa+2 more
doaj +1 more source