Results 61 to 70 of about 164,829 (289)
More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function
We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$.
Hayashi, Masahito, Tsurumaru, Toyohiro
core +1 more source
Fast Locality-Sensitive Hashing Frameworks for Approximate Near Neighbor Search
The Indyk-Motwani Locality-Sensitive Hashing (LSH) framework (STOC 1998) is a general technique for constructing a data structure to answer approximate near neighbor queries by using a distribution $\mathcal{H}$ over locality-sensitive hash functions ...
A Andoni +12 more
core +1 more source
Confirmation of a Non‐Transiting Planet in the Habitable Zone of the Nearby M Dwarf L 98‐59
ABSTRACT Only 40 exoplanetary systems with five or more planets are currently known. These systems are crucial for our understanding of planet formation and planet‐planet interaction. The M dwarf L 98‐59 has previously been found to show evidence of five planets, three of which are transiting.
Paul I. Schwarz +2 more
wiley +1 more source
Parallel FP-Growth Algorithm Based on Load Balance [PDF]
Aiming at the problem that the lookup operation of FP-Growth algorithm has a high time complexity,this paper proposes a new algorithm named LBPFP.The algorithm is based on PFP algorithm,which is added a hash table to the head table to achieve fast access
GAO Quan,WAN Xiaodong
doaj +1 more source
In the modern era of multicore processors, utilizing cores is a tedious job. Synchronization and communication among processors involve high cost. Software transaction memory systems (STMs) addresses this issues and provide better concurrency in which ...
CH Papadimitriou +7 more
core +1 more source
ABSTRACT This study explores the practical application of blockchain technology in accounting through a single case study of TLAB SCF, an Italian financial consulting firm actively involved in national and European digital innovation initiatives. The research adopts the technology acceptance model to investigate how perceived usefulness and perceived ...
Paolo Pietro Biancone +3 more
wiley +1 more source
A Distance-Encoded Bloom Filter for Fast NDN Name Lookup
Named data networking (NDN) is a content-centric network architecture that requires efficient name lookup to forward packets based on hierarchical content names.
Junghwan Kim, Myeong-Cheol Ko
doaj +1 more source
Accurate querying of frequent subgraphs in power grid graph data
With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have chosen different indexing methods in the
Aihua Zhou +3 more
doaj +1 more source
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj +1 more source
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil +2 more
wiley +1 more source

