Results 81 to 90 of about 164,829 (289)

Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks

open access: yesInternational Journal of Distributed Sensor Networks, 2010
We present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. We propose localized algorithms
Harshavardhan Sabbineni   +1 more
doaj   +1 more source

A Classification Retrieval Method for Encrypted Speech Based on Deep Neural Network and Deep Hashing

open access: yesIEEE Access, 2020
In order to improve the retrieval efficiency and accuracy of the existing encrypted speech retrieval methods, and improve the semantic representation of speech features and classification performance, a classification retrieval method for encrypted ...
Qiuyu Zhang, Xuejiao Zhao, Yingjie Hu
doaj   +1 more source

Reducing response bias in reports of trauma and posttraumatic stress disorder: An application of the nonverbal response card in a survey of youth in Burkina Faso

open access: yesJournal of Traumatic Stress, EarlyView.
Abstract Response bias for sensitive questions in face‐to‐face interviewer‐administered surveys is a common problem. Our objective was to evaluate the effectiveness of the nonverbal response card (NVRC) in soliciting responses to questions about lifetime trauma exposure and posttraumatic stress disorder (PTSD) symptoms.
David P. Lindstrom   +4 more
wiley   +1 more source

Fast distributed video deduplication via locality-sensitive hashing with similarity ranking

open access: yesEURASIP Journal on Image and Video Processing, 2019
The exponentially growing amount of video data being produced has led to tremendous challenges for video deduplication technology. Nowadays, many different deduplication approaches are being rapidly developed, but they are generally slow and their ...
Yeguang Li, Liang Hu, Ke Xia, Jie Luo
doaj   +1 more source

More Analysis of Double Hashing for Balanced Allocations

open access: yes, 2015
With double hashing, for a key $x$, one generates two hash values $f(x)$ and $g(x)$, and then uses combinations $(f(x) +i g(x)) \bmod n$ for $i=0,1,2,...$ to generate multiple hash values in the range $[0,n-1]$ from the initial two.
Mitzenmacher, Michael
core   +1 more source

Challenges and opportunities in mitigating sarcoptic mange in wild South American camelids

open access: yesThe Journal of Wildlife Management, EarlyView.
Wild South American camelids—vicuña and guanaco—face threats from sarcoptic mange, a contagious skin disease linked to severe population declines. Despite its impact, major gaps remain in understanding disease dynamics. This review summarizes current knowledge, identifies key data and management gaps, and outlines urgent actions for effective ...
Alynn M. Martin   +13 more
wiley   +1 more source

Linear Hashing is Awesome

open access: yes, 2016
We consider the hash function $h(x) = ((ax+b) \bmod p) \bmod n$ where $a,b$ are chosen uniformly at random from $\{0,1,\ldots,p-1\}$. We prove that when we use $h(x)$ in hashing with chaining to insert $n$ elements into a table of size $n$ the expected ...
Knudsen, Mathias Bæk Tejs
core   +1 more source

WarpCore: A Library for fast Hash Tables on GPUs [PDF]

open access: green, 2020
Daniel Jünger   +6 more
openalex   +1 more source

Incongruent, but I Get It! How Narrative Transportation Drives Engagement in Virtual Reality Advertising

open access: yesPsychology &Marketing, EarlyView.
ABSTRACT Virtual reality (VR) is a promising new technology that has gained attention from industry and academia, focusing on immersing consumers in simulated services and experiences and, more recently, on recognizing the emerging trend of video watching using VR headsets.
Meng‐Hua Hsieh   +2 more
wiley   +1 more source

CAR:a P2P content addressable andauto-retrievable algorithm for MANET

open access: yesTongxin xuebao, 2011
To be directed at the unique features of mobile ad-hoc network(MANET) environment,a kind of mobile P2P(MP2P) index structure.Geographic-information-based hierarchical hash index structure(GH2I),was presented based on DHT(Distributed Hash Table).On the ...
WU Hua-feng1   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy