Results 31 to 40 of about 77,938 (281)

Deep Hashing Based on Class-Discriminated Neighborhood Embedding

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2020
Deep-hashing methods have drawn significant attention during the past years in the field of remote sensing (RS) owing to their prominent capabilities for capturing the semantics from complex RS scenes and generating the associated hash codes in an end-to-
Jian Kang   +4 more
doaj   +1 more source

Asymmetric Deep Supervised Hashing

open access: yes, 2017
Hashing has been widely used for large-scale approximate nearest neighbor search because of its storage and search efficiency. Recent work has found that deep supervised hashing can significantly outperform non-deep supervised hashing in many ...
Jiang, Qing-Yuan, Li, Wu-Jun
core   +1 more source

Fast hashing with Strong Concentration Bounds

open access: yes, 2020
Previous work on tabulation hashing by Patrascu and Thorup from STOC'11 on simple tabulation and from SODA'13 on twisted tabulation offered Chernoff-style concentration bounds on hash based sums, e.g., the number of balls/keys hashing to a given bin, but
Aamand Anders   +9 more
core   +1 more source

Unsupervised Triplet Hashing for Fast Image Retrieval

open access: yes, 2017
Hashing has played a pivotal role in large-scale image retrieval. With the development of Convolutional Neural Network (CNN), hashing learning has shown great promise.
Huang, Shanshan   +3 more
core   +1 more source

Simultaneous Feature Learning and Hash Coding with Deep Neural Networks [PDF]

open access: yes, 2015
Similarity-preserving hashing is a widely-used method for nearest neighbour search in large-scale image retrieval tasks. For most existing hashing methods, an image is first encoded as a vector of hand-engineering visual features, followed by another ...
Lai, Hanjiang   +3 more
core   +1 more source

Deep Discrete Hashing with Self-supervised Pairwise Labels

open access: yes, 2017
Hashing methods have been widely used for applications of large-scale image retrieval and classification. Non-deep hashing methods using handcrafted features have been significantly outperformed by deep hashing methods due to their better feature ...
A Andoni   +12 more
core   +1 more source

Scalable IoT Platform for Heterogeneous Devices in Smart Environments

open access: yesIEEE Access, 2020
The Internet of Things (IoT) is envisioned as a ubiquitous computing infrastructure in which everything becomes connected, enabling gigantic information exchange among Things and people.
Asad Javed   +3 more
doaj   +1 more source

More Analysis of Double Hashing for Balanced Allocations

open access: yes, 2015
With double hashing, for a key $x$, one generates two hash values $f(x)$ and $g(x)$, and then uses combinations $(f(x) +i g(x)) \bmod n$ for $i=0,1,2,...$ to generate multiple hash values in the range $[0,n-1]$ from the initial two.
Mitzenmacher, Michael
core   +1 more source

A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies

open access: yes, 2020
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms, and it is used as a proof-of-work function in several cryptocurrencies.
Balatsoukas-Stimming, Alexios   +4 more
core   +2 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy