Results 11 to 20 of about 28,128 (285)
FSH: fast spaced seed hashing exploiting adjacent hashes [PDF]
Background Patterns with wildcards in specified positions, namely spaced seeds, are increasingly used instead of k-mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better ...
Samuele Girotto +2 more
doaj +3 more sources
Comprehensive Performance Study of Hashing Functions [PDF]
Most literature on hashing functions speaks in terms of hashing functions being either ‘good’ or ‘bad’. In this paper, we demonstrate how a hashing function that gives good results for one key set, performs badly for another.
G. M. Sridevi +2 more
doaj +1 more source
Optimizing Non-Differentiable Metrics for Hashing
Image hashing embeds the image to binary codes which can boost the efficiency of approximately nearest neighbors search. F-measure is a widely-used metric for evaluating the performance of hashing methods.
Yiwen Wei, Dayong Tian, Jiao Shi, Yu Lei
doaj +1 more source
Although hash function learning algorithms have achieved great success in recent years, most existing hash models are off-line, which are not suitable for processing sequential or online data. To address this problem, this work proposes an online hash model to accommodate data coming in stream for online learning.
Long-Kai Huang +2 more
openaire +3 more sources
Comparison of hashing methods for supporting consistency in distributed databases
The object of research is the methods of ensuring consistency in distributed systems. Distributed systems allow you to use any service regardless of the user's geolocation while maintaining high performance.
В. Нікітін, Є. Крилов
doaj +1 more source
As a result of the limited resources available in IoT local devices, the large scale cloud consumer’s data that are produced by IoT related machines are contracted out to the cloud. Cloud computing is unreliable, using it can compromise user privacy, and
Kranthi Kumar Singamaneni +4 more
doaj +1 more source
PalmHashNet: Palmprint Hashing Network for Indexing Large Databases to Boost Identification
Palmprint identification aims to establish the identity of a given query sample by comparing it with all the templates in the database and locating the most similar one. It becomes computationally expensive as the size of the database grows.
Geetika Arora +3 more
doaj +1 more source
A further analysis of Cuckoo Hashing with a Stash and Random Graphs of Excess r [PDF]
Analysis of ...
Reinhard Kutzelnigg
doaj +1 more source
With the rapid growth of multimedia data (e.g., image, audio, and video) on the Web, the learning-based hashing techniques, such as deep supervised hashing, have proven to be very efficient for large-scale multimedia search.
Zhan Yang +3 more
doaj +1 more source
AAU-Net: Attention-Based Asymmetric U-Net for Subject-Sensitive Hashing of Remote Sensing Images
The prerequisite for the use of remote sensing images is that their security must be guaranteed. As a special subset of perceptual hashing, subject-sensitive hashing overcomes the shortcomings of the existing perceptual hashing that cannot distinguish ...
Kaimeng Ding +5 more
doaj +1 more source

