Results 81 to 90 of about 164,829 (289)
Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks
We present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. We propose localized algorithms
Harshavardhan Sabbineni +1 more
doaj +1 more source
A Classification Retrieval Method for Encrypted Speech Based on Deep Neural Network and Deep Hashing
In order to improve the retrieval efficiency and accuracy of the existing encrypted speech retrieval methods, and improve the semantic representation of speech features and classification performance, a classification retrieval method for encrypted ...
Qiuyu Zhang, Xuejiao Zhao, Yingjie Hu
doaj +1 more source
Abstract Response bias for sensitive questions in face‐to‐face interviewer‐administered surveys is a common problem. Our objective was to evaluate the effectiveness of the nonverbal response card (NVRC) in soliciting responses to questions about lifetime trauma exposure and posttraumatic stress disorder (PTSD) symptoms.
David P. Lindstrom +4 more
wiley +1 more source
Fast distributed video deduplication via locality-sensitive hashing with similarity ranking
The exponentially growing amount of video data being produced has led to tremendous challenges for video deduplication technology. Nowadays, many different deduplication approaches are being rapidly developed, but they are generally slow and their ...
Yeguang Li, Liang Hu, Ke Xia, Jie Luo
doaj +1 more source
More Analysis of Double Hashing for Balanced Allocations
With double hashing, for a key $x$, one generates two hash values $f(x)$ and $g(x)$, and then uses combinations $(f(x) +i g(x)) \bmod n$ for $i=0,1,2,...$ to generate multiple hash values in the range $[0,n-1]$ from the initial two.
Mitzenmacher, Michael
core +1 more source
Challenges and opportunities in mitigating sarcoptic mange in wild South American camelids
Wild South American camelids—vicuña and guanaco—face threats from sarcoptic mange, a contagious skin disease linked to severe population declines. Despite its impact, major gaps remain in understanding disease dynamics. This review summarizes current knowledge, identifies key data and management gaps, and outlines urgent actions for effective ...
Alynn M. Martin +13 more
wiley +1 more source
We consider the hash function $h(x) = ((ax+b) \bmod p) \bmod n$ where $a,b$ are chosen uniformly at random from $\{0,1,\ldots,p-1\}$. We prove that when we use $h(x)$ in hashing with chaining to insert $n$ elements into a table of size $n$ the expected ...
Knudsen, Mathias Bæk Tejs
core +1 more source
WarpCore: A Library for fast Hash Tables on GPUs [PDF]
Daniel Jünger +6 more
openalex +1 more source
ABSTRACT Virtual reality (VR) is a promising new technology that has gained attention from industry and academia, focusing on immersing consumers in simulated services and experiences and, more recently, on recognizing the emerging trend of video watching using VR headsets.
Meng‐Hua Hsieh +2 more
wiley +1 more source
CAR:a P2P content addressable andauto-retrievable algorithm for MANET
To be directed at the unique features of mobile ad-hoc network(MANET) environment,a kind of mobile P2P(MP2P) index structure.Geographic-information-based hierarchical hash index structure(GH2I),was presented based on DHT(Distributed Hash Table).On the ...
WU Hua-feng1 +2 more
doaj +2 more sources

