Results 51 to 60 of about 1,628,666 (344)

CHAP : Enabling efficient hardware-based multiple hash schemes for IP lookup [PDF]

open access: yes, 2008
Building a high performance IP lookup engine remains a challenge due to increasingly stringent throughput requirements and the growing size of IP tables.
Cho, S   +3 more
core   +5 more sources

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, EarlyView., 2022
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

Novel distributed Hash table——BChord

open access: yesTongxin xuebao, 2008
A novel distributed Hash table(DHT) BChord was presented. BChord adopts bi-directional search mechanism of Chord. Though query items of finger table in BChord almost double to Chord, compared with Chord, BChord evi- dently increases speed at searching of
ZHENG Yan1   +3 more
doaj   +2 more sources

ESH: Design and Implementation of an Optimal Hashing Scheme for Persistent Memory

open access: yesApplied Sciences, 2023
Recent advancements in memory technology have opened up a wealth of possibilities for innovation in data structures. The emergence of byte-addressable persistent memory (PM) with its impressive capacity and low latency has accelerated the adoption of PM ...
Dereje Regassa   +2 more
doaj   +1 more source

Semi‐Paired Semi‐Supervised Deep Hashing for cross‐view retrieval

open access: yesIET Computer Vision, EarlyView., 2022
In this study, a Semi‐Paired Semi‐Supervised Deep Hashing (SPSDH) is proposed. SPSDH is a novel end‐to‐end deep neural network model with high‐order affinity. A non‐local higher‐order affinity measure that better considers the multimodal neighbourhood structure. And a common representation to associate different modalities is introduced, which combined
Yi Wang   +3 more
wiley   +1 more source

Improved Session Table Architecture for Denial of Stateful Firewall Attacks

open access: yesIEEE Access, 2018
Stateful firewalls keep track of the state of network connections. The performance of stateful firewalls depends mainly on the processing of session tables and the mechanism used for packet filtering.
Zouheir Trabelsi   +3 more
doaj   +1 more source

On the Insertion Time of Cuckoo Hashing

open access: yes, 2013
Cuckoo hashing is an efficient technique for creating large hash tables with high space utilization and guaranteed constant access times. There, each item can be placed in a location given by any one out of k different hash functions.
Fountoulakis, Nikolaos   +2 more
core   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]

open access: yes, 2009
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits.
Akinwale, A. T., Ibharalu, F. T.
core   +1 more source

Designing Physical Unclonable Functions From Optically Active Materials

open access: yesAdvanced Materials, EarlyView.
Assigning unforgeable “fingerprints” to manufactured goods is a key strategy to fight global counterfeiting. Optical physical unclonable functions (PUFs) are chemically generated random patterns of optically active materials serving as unique authenticators.
Maxime Klausen   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy