Results 31 to 40 of about 569,401 (216)
Comprehensive Performance Study of Hashing Functions [PDF]
Most literature on hashing functions speaks in terms of hashing functions being either ‘good’ or ‘bad’. In this paper, we demonstrate how a hashing function that gives good results for one key set, performs badly for another.
G. M. Sridevi+2 more
doaj +1 more source
High Performance Construction of RecSplit Based Minimal Perfect Hash Functions [PDF]
A minimal perfect hash function (MPHF) bijectively maps a set S of objects to the first |S| integers. It can be used as a building block in databases and data compression.
Bez, Dominik+3 more
core +4 more sources
XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj +1 more source
General encoding of canonical k-mers
To index or compare sequences efficiently, often k-mers, i.e., substrings of fixed length k, are used. For efficient indexing or storage, k-mers are often encoded as integers, e.g., applying some bijective mapping between all possible σk k-mers and the ...
Wittler, Roland
doaj +1 more source
Efficient Cancelable Template Generation Based on Signcryption and Bio Hash Function
Cancelable biometrics is a demanding area of research in which a cancelable template conforming to a biometric is produced without degrading the efficiency.
Vani Rajasekar+5 more
doaj +1 more source
Abstract A class of adamantane‐like molecular materials attracts attention because they exhibit an extreme non‐linear optical response and emit a broad white‐light spectrum after illumination with a continuous‐wave infrared laser source. According to recent studies, not only the nature of the cluster molecules, but also the macroscopic structure of the
Sebastian Schwan+7 more
wiley +1 more source
Small file processing in Hadoop is one of the challenging task. The performance of the Hadoop is quite good when dealing with large files because they require lesser metadata and consume less memory. But while dealing with enormous amount of small files,
Vijay Shankar Sharma+4 more
doaj +1 more source
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption.
Shimaa A. Abdel Hakeem+2 more
doaj +1 more source
EESSI: A cross‐platform ready‐to‐use optimised scientific software stack
Abstract Getting scientific software installed correctly and ensuring it performs well has been a ubiquitous problem for several decades now, which is compounded currently by the changing landscape of computational science with the (re‐)emergence of different microprocessor families, and the expansion to additional scientific domains like artificial ...
Bob Dröge+5 more
wiley +1 more source
Accelerating Minimal Perfect Hash Function Construction Using GPU Parallelization [PDF]
Eine Minimale Perfekte Hashfunktion (MPHF) bildet eine Menge von N Schlüsseln kollisionsfrei auf die Menge [N ] := {0, .., N − 1} ab. Diese Thesis leistet einen signifikanten Beitrag für den folgenden generischen MPHF Konstruktionsalgorithmus.
Hermann, Stefan
core +2 more sources