Results 61 to 70 of about 169,343 (316)
Fast Exact Search in Hamming Space with Multi-Index Hashing [PDF]
There is growing interest in representing image data and feature descriptors using compact binary codes for fast near neighbor search. Although binary codes are motivated by their use as direct indices (addresses) into a hash table, codes longer than 32 ...
Fleet, David J. +2 more
core +1 more source
A Hash Table Without Hash Functions, and How to Get the Most Out of Your Random Bits [PDF]
William Kuszmaul
openalex +1 more source
ABSTRACT The growing impacts of climate change and energy scarcity demand environmentally sustainable refrigeration solutions. This study investigates eco‐friendly refrigerants (R152a, R290 and R600a) and their optimized ternary mixture as alternatives to R134a. Four blend compositions were analysed using experimental testing and REFPROP 10.0 modelling
M. Periyasamy, P. Senthilkumar
wiley +1 more source
OpenFlow table lookup scheme integrating multiple-cell Hash table with TCAM
In OpenFlow networks,switches accept flow rules through standardized interfaces,and perform flow-based packet processing.To facilitate the lookup of flow tables,TCAM has been widely used in OpenFlow switches.However,TCAM is expensive and consumes a large
Chun-qiang LI +2 more
doaj +2 more sources
Avoiding Rotated Bitboards with Direct Lookup [PDF]
This paper describes an approach for obtaining direct access to the attacked squares of sliding pieces without resorting to rotated bitboards. The technique involves creating four hash tables using the built in hash arrays from an interpreted, high level
Tannous, Sam
core
Trusty URIs: Verifiable, Immutable, and Permanent Digital Artifacts for Linked Data [PDF]
To make digital resources on the web verifiable, immutable, and permanent, we propose a technique to include cryptographic hash values in URIs. We call them trusty URIs and we show how they can be used for approaches like nanopublications to make not ...
A. Callahan +12 more
core +4 more sources
Blockchain Technology and the Circular Economy Transition: Associations With Company Performance
ABSTRACT The adoption of circular economy (CE) practices in the private sector has received increasing academic and managerial attention, although the implementation of such practices continues to face significant barriers. Among Industry 4.0 technologies, blockchain has been identified as a potential factor associated with the CE transition.
Josep Llach +3 more
wiley +1 more source
More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function
We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$.
Hayashi, Masahito, Tsurumaru, Toyohiro
core +1 more source
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil +2 more
wiley +1 more source
Simple Access to a Series of Higher Substituted Pentafluoroorthotellurate‐Based Silanes
The pentafluoroorthotellurate ligand was introduced to organo silanes. A variety of silanes with the formular RxSi(OTeF5)4–x were synthesized and characterized via spectroscopic techniques and sc‐XRD. The influence of the number of OTeF5 groups on structural properties as well as the fluoride ion affinities (FIA) has been studied and compared to other ...
Friederike Oesten +7 more
wiley +1 more source

