Results 71 to 80 of about 168,960 (287)

Iceberg Hashing: Optimizing Many Hash-Table Criteria at Once

open access: yesJournal of the ACM, 2023
Despite being one of the oldest data structures in computer science, hash tables continue to be the focus of a great deal of both theoretical and empirical research. A central reason for this is that many of the fundamental properties that one desires from a hash table are difficult to achieve simultaneously; thus many variants offering different trade-
Michael A. Bender   +4 more
openaire   +4 more sources

SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications

open access: yesAdvanced Intelligent Systems, EarlyView.
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley   +1 more source

Genomic Contributors to Congenital Diaphragmatic Hernia: Results of Exome Sequencing in 560 Probands and Cross Reference of Findings in an Independent Cohort

open access: yesAmerican Journal of Medical Genetics Part A, EarlyView.
ABSTRACT There is a strong genetic contribution to the etiology of congenital diaphragmatic hernia (CDH). This study evaluated genetic testing results and diagnostic yield for fetuses and children with CDH. This was a retrospective cohort study of exome sequencing (ES) performed at GeneDx for fetuses and children ≤ 18 years of age with CDH compared ...
Justin Blair   +9 more
wiley   +1 more source

Blockchain Technology and the Circular Economy Transition: Associations With Company Performance

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The adoption of circular economy (CE) practices in the private sector has received increasing academic and managerial attention, although the implementation of such practices continues to face significant barriers. Among Industry 4.0 technologies, blockchain has been identified as a potential factor associated with the CE transition.
Josep Llach   +3 more
wiley   +1 more source

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

Parallel FP-Growth Algorithm Based on Load Balance [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the problem that the lookup operation of FP-Growth algorithm has a high time complexity,this paper proposes a new algorithm named LBPFP.The algorithm is based on PFP algorithm,which is added a hash table to the head table to achieve fast access
GAO Quan,WAN Xiaodong
doaj   +1 more source

A Quantum Algorithm To Locate Unknown Hashes For Known N-Grams Within A Large Malware Corpus

open access: yes, 2020
Quantum computing has evolved quickly in recent years and is showing significant benefits in a variety of fields. Malware analysis is one of those fields that could also take advantage of quantum computing.
Allgood, Nicholas R.   +1 more
core  

Drug Critical Limits for Urgent Physician Notification

open access: yesClinical Pharmacology &Therapeutics, EarlyView.
Critical limits represent quantitative decision thresholds for drugs that require immediate clinician notification and potential life‐saving intervention. United States hospitals lack a national standard for drug critical limits. We collected critical limits from 417 US hospitals across all 50 states and Washington, D.C.; of these, 411 maintained drug ...
Elina Kuang   +3 more
wiley   +1 more source

A Distance-Encoded Bloom Filter for Fast NDN Name Lookup

open access: yesApplied Sciences
Named data networking (NDN) is a content-centric network architecture that requires efficient name lookup to forward packets based on hierarchical content names.
Junghwan Kim, Myeong-Cheol Ko
doaj   +1 more source

A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

open access: yesIEEE Access, 2020
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj   +1 more source

Home - About - Disclaimer - Privacy