Results 21 to 30 of about 115,913 (217)
GPERF : a perfect hash function generator [PDF]
gperf is a widely available perfect hash function generator written in C++. It automates a common system software operation: keyword recognition. gperf translates an n element user-specified keyword list keyfile into source code containing a k element ...
Schmidt, Douglas C., Suda, Tatsuya
core +2 more sources
Finding and Applying Perfect Hash Functions
Nick Cercone
openalex +3 more sources
Comprehensive Performance Study of Hashing Functions [PDF]
Most literature on hashing functions speaks in terms of hashing functions being either ‘good’ or ‘bad’. In this paper, we demonstrate how a hashing function that gives good results for one key set, performs badly for another.
G. M. Sridevi+2 more
doaj +1 more source
Minimal perfect hash functions in large scale bioinformatics Problem
. Genomic and metagenomic fields, generating huge sets ofshort genomic sequences, brought their own share of high performanceproblems. To extract relevant pieces of information from the huge datasets generated by current sequencing techniques, one must rely on extremelyscalable methods and solutions. Indexing billions of objects isa task considered too
Antoine Limasset+3 more
openalex +3 more sources
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik+5 more
doaj +1 more source
XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj +1 more source
General encoding of canonical k-mers
To index or compare sequences efficiently, often k-mers, i.e., substrings of fixed length k, are used. For efficient indexing or storage, k-mers are often encoded as integers, e.g., applying some bijective mapping between all possible σk k-mers and the ...
Wittler, Roland
doaj +1 more source
Small file processing in Hadoop is one of the challenging task. The performance of the Hadoop is quite good when dealing with large files because they require lesser metadata and consume less memory. But while dealing with enormous amount of small files,
Vijay Shankar Sharma+4 more
doaj +1 more source
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption.
Shimaa A. Abdel Hakeem+2 more
doaj +1 more source