Results 71 to 80 of about 167,829 (332)
More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function
We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$.
Hayashi, Masahito, Tsurumaru, Toyohiro
core +1 more source
ABSTRACT The growing impacts of climate change and energy scarcity demand environmentally sustainable refrigeration solutions. This study investigates eco‐friendly refrigerants (R152a, R290 and R600a) and their optimized ternary mixture as alternatives to R134a. Four blend compositions were analysed using experimental testing and REFPROP 10.0 modelling
M. Periyasamy, P. Senthilkumar
wiley +1 more source
A Distance-Encoded Bloom Filter for Fast NDN Name Lookup
Named data networking (NDN) is a content-centric network architecture that requires efficient name lookup to forward packets based on hierarchical content names.
Junghwan Kim, Myeong-Cheol Ko
doaj +1 more source
Accurate querying of frequent subgraphs in power grid graph data
With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have chosen different indexing methods in the
Aihua Zhou +3 more
doaj +1 more source
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj +1 more source
Fast Locality-Sensitive Hashing Frameworks for Approximate Near Neighbor Search
The Indyk-Motwani Locality-Sensitive Hashing (LSH) framework (STOC 1998) is a general technique for constructing a data structure to answer approximate near neighbor queries by using a distribution $\mathcal{H}$ over locality-sensitive hash functions ...
A Andoni +12 more
core +1 more source
Confirmation of a Non‐Transiting Planet in the Habitable Zone of the Nearby M Dwarf L 98‐59
ABSTRACT Only 40 exoplanetary systems with five or more planets are currently known. These systems are crucial for our understanding of planet formation and planet‐planet interaction. The M dwarf L 98‐59 has previously been found to show evidence of five planets, three of which are transiting.
Paul I. Schwarz +2 more
wiley +1 more source
A Quantum Algorithm To Locate Unknown Hashes For Known N-Grams Within A Large Malware Corpus
Quantum computing has evolved quickly in recent years and is showing significant benefits in a variety of fields. Malware analysis is one of those fields that could also take advantage of quantum computing.
Allgood, Nicholas R. +1 more
core
A class of structured P2P systems supporting browsing [PDF]
Browsing is a way of finding documents in a large amount of data which is complementary to querying and which is particularly suitable for multimedia documents.
Cohen, Julien
core +2 more sources
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil +2 more
wiley +1 more source

