Results 31 to 40 of about 76,072 (189)
Background Specialized data structures are required for online algorithms to efficiently handle large sequencing datasets. The counting quotient filter (CQF), a compact hashtable, can efficiently store k-mers with a skewed distribution.
Moustafa Shokrof +2 more
doaj +1 more source
A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security.
Man Chun Chow, Maode Ma
doaj +1 more source
Minimal perfect hash functions in large scale bioinformatics Problem
. Genomic and metagenomic fields, generating huge sets ofshort genomic sequences, brought their own share of high performanceproblems. To extract relevant pieces of information from the huge datasets generated by current sequencing techniques, one must rely on extremelyscalable methods and solutions. Indexing billions of objects isa task considered too
Antoine Limasset +3 more
openalex +3 more sources
Analyzing execution path non-determinism of the Linux kernel in different scenarios
Safety-critical systems play a significant role in industrial domains, and their complexity is increasing with advanced technologies such as Artificial Intelligence (AI).
Yucong Chen +5 more
doaj +1 more source
A Lightweight Three-Factor Authentication Scheme for WHSN Architecture
Wireless Healthcare Sensor Network (WHSN) is a benchmarking technology deployed to levitate the quality of lives for the patients and doctors. WHSN systems must fit IEEE 802.15.6 standard for specific application criteria, unlike some standard criteria ...
Abdullah M. Almuhaideb +1 more
doaj +1 more source
In the article is developing new theoretical approaches to the construction of the concept of active security on the points of an elliptic curve, which are based on the new scheme of perfect secret sharing on the points of an elliptic curve, permit the ...
Nikolay Ivanovich Chervyakov +4 more
doaj
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key [PDF]
In this article, we propose a novel bilateral generalization inhomogenous short integer solution (BiGISIS)-based password-authenticated key exchange (PAKE) scheme for post-quantum era security.
Kübra Seyhan, Sedat Akleylek
doaj +2 more sources
Finding succinct ordered minimal perfect hash functions [PDF]
Abstract An ordered minimal perfect hash table is one in which no collisions occur among a predefined set of keys, no space is unused and the data are placed in the table in order. A new method for creating ordered minimal perfect hash functions is presented.
Seiden, Steven S., Hirschberg, Daniel S.
openaire +1 more source
A Simulated Annealing Algorithm to Construct Covering Perfect Hash Families
Covering perfect hash families (CPHFs) are combinatorial designs that represent certain covering arrays in a compact way. In previous works, CPHFs have been constructed using backtracking, tabu search, and greedy algorithms.
J. Torres-Jiménez +1 more
semanticscholar +1 more source
Simple Access to a Series of Higher Substituted Pentafluoroorthotellurate‐Based Silanes
The pentafluoroorthotellurate ligand was introduced to organo silanes. A variety of silanes with the formular RxSi(OTeF5)4–x were synthesized and characterized via spectroscopic techniques and sc‐XRD. The influence of the number of OTeF5 groups on structural properties as well as the fluoride ion affinities (FIA) has been studied and compared to other ...
Friederike Oesten +7 more
wiley +1 more source

