Results 81 to 90 of about 1,628,666 (344)
A hitchhiker's guide to single‐cell epigenomics: Methods and applications for cancer research
Abstract Genetic mutations are well known to influence tumorigenesis, tumor progression, treatment response and relapse, but the role of epigenetic variation in cancer progression is still largely unexplored. The lack of epigenetic understanding in cancer evolution is in part due to the limited availability of methods to examine such a heterogeneous ...
Marta Moreno‐Gonzalez+2 more
wiley +1 more source
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj +1 more source
Avoiding Rotated Bitboards with Direct Lookup [PDF]
This paper describes an approach for obtaining direct access to the attacked squares of sliding pieces without resorting to rotated bitboards. The technique involves creating four hash tables using the built in hash arrays from an interpreted, high level
Tannous, Sam
core
Quantitative blood loss values reveal high rates of undiagnosed postpartum hemorrhage
Abstract Objective In this study, we examined quantitative blood loss (QBL) values and postpartum hemorrhage (PPH) diagnoses in relation to clinical, demographic, and hospitalization related variables. Methods A retrospective chart review was conducted of deliveries at a regional hospital over a nine‐month period, querying patient demographics, PPH ...
Burhan A. Khan+6 more
wiley +1 more source
A class of structured P2P systems supporting browsing [PDF]
Browsing is a way of finding documents in a large amount of data which is complementary to querying and which is particularly suitable for multimedia documents.
Cohen, Julien
core +2 more sources
PMAT2: An efficient graphical assembly toolkit for comprehensive organellar genomes
We developed PMAT2, an advanced toolkit for lineage‐specific de novo assembly of plant, animal, and fungal mitochondrial genomes, as well as plant chloroplast genome. PMAT2 leverages optimized graph‐based strategies tailored to organelle genome complexity, enabling complete and accurate assemblies, even with approximately 1 × highly accurate PacBio ...
Fuchuan Han+10 more
wiley +1 more source
A Distance-Encoded Bloom Filter for Fast NDN Name Lookup
Named data networking (NDN) is a content-centric network architecture that requires efficient name lookup to forward packets based on hierarchical content names.
Junghwan Kim, Myeong-Cheol Ko
doaj +1 more source
We present the first parallel compact hash table algorithm. It delivers high performance and scalability due to its dynamic region-based locking scheme with only a fraction of the memory requirements of a regular hash table.
Steven van der Vegt, Alfons Laarman
openaire +3 more sources
Weighted distributed hash tables [PDF]
We present two methods for weighted consistent hashing also known as weighted distributed hash tables. The first method, called Linear Method, combines the standard consistent hasing introduced by Karger et al. [9] with a linear weighted distance measure.
Christian Schindelhauer+1 more
openaire +2 more sources
SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.+5 more
core +1 more source