Results 71 to 80 of about 168,960 (287)
Iceberg Hashing: Optimizing Many Hash-Table Criteria at Once
Despite being one of the oldest data structures in computer science, hash tables continue to be the focus of a great deal of both theoretical and empirical research. A central reason for this is that many of the fundamental properties that one desires from a hash table are difficult to achieve simultaneously; thus many variants offering different trade-
Michael A. Bender +4 more
openaire +4 more sources
SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley +1 more source
ABSTRACT There is a strong genetic contribution to the etiology of congenital diaphragmatic hernia (CDH). This study evaluated genetic testing results and diagnostic yield for fetuses and children with CDH. This was a retrospective cohort study of exome sequencing (ES) performed at GeneDx for fetuses and children ≤ 18 years of age with CDH compared ...
Justin Blair +9 more
wiley +1 more source
Blockchain Technology and the Circular Economy Transition: Associations With Company Performance
ABSTRACT The adoption of circular economy (CE) practices in the private sector has received increasing academic and managerial attention, although the implementation of such practices continues to face significant barriers. Among Industry 4.0 technologies, blockchain has been identified as a potential factor associated with the CE transition.
Josep Llach +3 more
wiley +1 more source
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil +2 more
wiley +1 more source
Parallel FP-Growth Algorithm Based on Load Balance [PDF]
Aiming at the problem that the lookup operation of FP-Growth algorithm has a high time complexity,this paper proposes a new algorithm named LBPFP.The algorithm is based on PFP algorithm,which is added a hash table to the head table to achieve fast access
GAO Quan,WAN Xiaodong
doaj +1 more source
A Quantum Algorithm To Locate Unknown Hashes For Known N-Grams Within A Large Malware Corpus
Quantum computing has evolved quickly in recent years and is showing significant benefits in a variety of fields. Malware analysis is one of those fields that could also take advantage of quantum computing.
Allgood, Nicholas R. +1 more
core
Drug Critical Limits for Urgent Physician Notification
Critical limits represent quantitative decision thresholds for drugs that require immediate clinician notification and potential life‐saving intervention. United States hospitals lack a national standard for drug critical limits. We collected critical limits from 417 US hospitals across all 50 states and Washington, D.C.; of these, 411 maintained drug ...
Elina Kuang +3 more
wiley +1 more source
A Distance-Encoded Bloom Filter for Fast NDN Name Lookup
Named data networking (NDN) is a content-centric network architecture that requires efficient name lookup to forward packets based on hierarchical content names.
Junghwan Kim, Myeong-Cheol Ko
doaj +1 more source
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj +1 more source

