Results 41 to 50 of about 168,960 (287)

Research of a Scheduling Optimization algorithm based on Hash Adapter

open access: yesMATEC Web of Conferences, 2017
The performance of hash-based Scheduling optimization algorithm for network flow cannot be bounded under the worst-case because of hash conflicts. To make up for the shortage of the above algorithm, a multiple-hash algorithm based on counting Hash ...
Yang Wenchuan, Fu Zhen, Zuo Wen
doaj   +1 more source

ESH: Design and Implementation of an Optimal Hashing Scheme for Persistent Memory

open access: yesApplied Sciences, 2023
Recent advancements in memory technology have opened up a wealth of possibilities for innovation in data structures. The emergence of byte-addressable persistent memory (PM) with its impressive capacity and low latency has accelerated the adoption of PM ...
Dereje Regassa   +2 more
doaj   +1 more source

Novel distributed Hash table——BChord

open access: yesTongxin xuebao, 2008
A novel distributed Hash table(DHT) BChord was presented. BChord adopts bi-directional search mechanism of Chord. Though query items of finger table in BChord almost double to Chord, compared with Chord, BChord evi- dently increases speed at searching of
ZHENG Yan1   +3 more
doaj   +2 more sources

The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]

open access: yes, 2009
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits.
Akinwale, A. T., Ibharalu, F. T.
core   +1 more source

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

Fast Exact Search in Hamming Space with Multi-Index Hashing [PDF]

open access: yes, 2014
There is growing interest in representing image data and feature descriptors using compact binary codes for fast near neighbor search. Although binary codes are motivated by their use as direct indices (addresses) into a hash table, codes longer than 32 ...
Fleet, David J.   +2 more
core   +1 more source

Perceived Impacts and Predictors of Cannabis Products used by Rheumatology Patients in Alberta: A Multivariable Analysis of Cross‐sectional Survey Data

open access: yesArthritis Care &Research, Accepted Article.
Objective This study aimed to characterize cannabis product choices (cannabinoid content and formulation) among rheumatology patients, and their associations with patient factors, patient reported perceived side effects and positive impacts. Methods An online survey (delivered from March to November 2022) was distributed by Alberta Health Services to ...
Susan Zhang   +10 more
wiley   +1 more source

Improved Session Table Architecture for Denial of Stateful Firewall Attacks

open access: yesIEEE Access, 2018
Stateful firewalls keep track of the state of network connections. The performance of stateful firewalls depends mainly on the processing of session tables and the mechanism used for packet filtering.
Zouheir Trabelsi   +3 more
doaj   +1 more source

Deterministic Detection of Single Ion Implantation

open access: yesAdvanced Engineering Materials, EarlyView.
Focused ion beam implantation with high detection efficiencies will enable the rapid and scalable fabrication of advanced spin‐based technologies such as qubits. This work presents the detection efficiencies of a wide range of ions implanted into solid‐state hosts, with efficiencies of >90% recorded for ion species and substrate combinations of ...
Mason Adshead   +6 more
wiley   +1 more source

Towards a Highly Available Model for Processing Service Requests Based on Distributed Hash Tables

open access: yesMathematics, 2022
This work aims to identify techniques leading to a highly available request processing service by using the natural decentralization and the dispersion power of the hash function involved in a Distributed Hash Table (DHT).
Voichiţa Iancu, Nicolae Ţăpuş
doaj   +1 more source

Home - About - Disclaimer - Privacy