Results 71 to 80 of about 1,654,513 (343)
Regular and almost universal hashing: an efficient implementation [PDF]
Random hashing can provide guarantees regarding the performance of data structures such as hash tables---even in an adversarial setting. Many existing families of hash functions are universal: given two data objects, the probability that they have the same hash value is low given that we pick hash functions at random.
arxiv +1 more source
Glioblastoma multiforme is the most devastating and incurable brain tumor. To better study this disease, a 3D model is developed using a hyaluronic acid‐based hydrogel combined with a multicellular approach. This model recapitulates in vivo brain stiffness, cell‐extracellular matrix and cell‐cell interactions and the tumor's hijacking function with the
Mateo S. Andrade Mier+26 more
wiley +1 more source
A method to fabricate anisotropic SiO2 patchy microspheres is presented using a modified microcontact printing technique. This involves a PDMS elastomer stamp with grooved surface topography, creating a confined environment for the microspheres.
Martin Reifarth+10 more
wiley +1 more source
Multiple Code Hashing for Efficient Image Retrieval [PDF]
Due to its low storage cost and fast query speed, hashing has been widely used in large-scale image retrieval tasks. Hash bucket search returns data points within a given Hamming radius to each query, which can enable search at a constant or sub-linear time cost.
arxiv
Understanding the Temperature Conditions for Controlled Splicing Between Silica and Fluoride Fibers
Thermal splicing conditions are investigated between silica and ZrF4 fibers, focusing on mechanical strength. A fiber Bragg grating characterises the thermal profile in the filament splicer's hot zone. Results indicate a narrow temperature window for strong joints.
Antreas Theodosiou+7 more
wiley +1 more source
OpenFlow table lookup scheme integrating multiple-cell Hash table with TCAM
In OpenFlow networks,switches accept flow rules through standardized interfaces,and perform flow-based packet processing.To facilitate the lookup of flow tables,TCAM has been widely used in OpenFlow switches.However,TCAM is expensive and consumes a large
Chun-qiang LI+2 more
doaj +2 more sources
Analysis and Test of Storage Algorithm of Card Reader of Personnel Positioning System
The paper analyzed three storage algorithms of chain storage algorithm, hash table storage algorithm and hash binary tree storage algorithm which are applicable to the card reader of personnel positioning system in term of search time and storage ...
ZHANG Feng, XU Zhao, ZHANG Kai-ting
doaj
Hyperdimensional Hashing: A Robust and Efficient Dynamic Hash Table [PDF]
Most cloud services and distributed applications rely on hashing algorithms that allow dynamic scaling of a robust and efficient hash table. Examples include AWS, Google Cloud and BitTorrent. Consistent and rendezvous hashing are algorithms that minimize key remapping as the hash table resizes.
arxiv
Electro‐Thermal Response of Thin Film Heaters Based on Embedded Periodic Metallic Mesh
“This study systematically investigates the effect of periodic metallic mesh topology on electrical and electro‐thermal behaviours of thin thermal heaters. The derived closed‐form expressions capture the dependence of sheet resistance on design parameters, providing a crucial tool for rapidly exploring a vast design space and accelerating design and ...
Dimitrios Charaklias+3 more
wiley +1 more source
Pelvic organ prolapse (POP) is a significant health challenge for women, especially with the lack of optimal surgical options post‐withdrawal of synthetic transvaginal meshes. The study pioneers degradable melt electrowrite vaginal implants with precise 22.5° angles and specific porosity. These configurations significantly influence macrophage behavior
Kallyanashis Paul+7 more
wiley +1 more source