Results 31 to 40 of about 1,654,513 (343)

A new hash function and its use in read mapping on genome [PDF]

open access: yesAUT Journal of Mathematics and Computing, 2020
Mapping reads onto genomes is an indispensable step in sequencing data analysis. A widely used method to speed up mapping is to index a genome by a hash table, in which genomic positions of $k$-mers are stored in the table.
Farzaneh Salari   +2 more
doaj   +1 more source

A Color Image Encryption Algorithm Based on Hash Table, Hilbert Curve and Hyper-Chaotic Synchronization

open access: yesMathematics, 2023
Chaotic systems, especially hyper-chaotic systems are suitable for digital image encryption because of their complex properties such as pseudo randomness and extreme sensitivity. This paper proposes a new color image encryption algorithm based on a hyper-
Xiaoyuan Wang   +5 more
semanticscholar   +1 more source

Hash Tables for a Digital Lexicon [PDF]

open access: yesRevista de Informática Teórica e Aplicada, 2021
This paper deals with the construction of digital lexicons within the scope of Natural Language Processing. Data Structures called Hash Tables have demonstrated to generate good results for Natural Language Interface for Databases and have data dispersion, response speed and programming simplicity as main features.
Fábio Carlos Moreno   +2 more
openaire   +2 more sources

A High Throughput Parallel Hash Table on FPGA using XOR-based Memory [PDF]

open access: yesIEEE Conference on High Performance Extreme Computing, 2020
Hash table is a fundamental data structure for quick search and retrieval of data. It is a key component in complex graph analytics and AI/ML applications. State-of-the-art parallel hash table implementations either make some simplifying assumptions such
Ruizhi Zhang   +4 more
semanticscholar   +1 more source

Authenticated hash tables [PDF]

open access: yesProceedings of the 15th ACM conference on Computer and communications security, 2008
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so that the client can save space or achieve load balancing. Authenticating the hash table functionality, i.e., verifying the correctness of queries answered by the server and ...
Nikos Triandopoulos   +2 more
openaire   +2 more sources

Key Concepts, Weakness and Benchmark on Hash Table Data Structures

open access: yesAlgorithms, 2022
Most computer programs or applications need fast data structures. The performance of a data structure is necessarily influenced by the complexity of its common operations; thus, any data-structure that exhibits a theoretical complexity of amortized ...
Santiago Tapia-Fernández   +2 more
doaj   +1 more source

On Routing in Distributed Hash Tables [PDF]

open access: yesSeventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007
There have been many proposals for constructing routing tables for distributed hash tables (DHT). They can be classified into two groups: A) those that assume that the peers are uniformly randomly distributed in the identifier space, and B) those that allow order-preserving hash functions that lead to a skewed peer distribution in the identifier space.
Klemm, Fabius   +3 more
openaire   +3 more sources

Ordered hash tables [PDF]

open access: yesThe Computer Journal, 1974
Abstract : Some variants of the traditional hash method, making use of the numerical or alphabetical order of the keys, lead to faster searching at the expense of a little extra work when items are inserted. The paper presents the new algorithms and analyzes their average running time. (Author)
Ole Amble, Donald E. Knuth
openaire   +1 more source

Network Traffic Sampling System Based on Storage Compression for Application Classification Detection

open access: yesIEEE Access, 2020
With the development of the Internet, numerous new applications have emerged, the features of which are constantly changing. It is necessary to perform application classification detection on the network traffic to monitor the changes in the applications.
Shichang Xuan   +5 more
doaj   +1 more source

FAST IMPLEMENTATION OF DIGITAL WATERMARKING SCHEMES BASED ON ARNOLD AND DISCRETE WAVELET TRANSFORMS [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2021
In recent years, digital watermarking of photo and video materials has become more and more important in connection with the transmission of multimedia data over unsecured communication channels.
A. G. Zotin, A. V. Proskurin
doaj   +1 more source

Home - About - Disclaimer - Privacy