Results 31 to 40 of about 569,401 (216)

Comprehensive Performance Study of Hashing Functions [PDF]

open access: yesComputer Science Journal of Moldova, 2023
Most literature on hashing functions speaks in terms of hashing functions being either ‘good’ or ‘bad’. In this paper, we demonstrate how a hashing function that gives good results for one key set, performs badly for another.
G. M. Sridevi   +2 more
doaj   +1 more source

High Performance Construction of RecSplit Based Minimal Perfect Hash Functions [PDF]

open access: yes, 2023
A minimal perfect hash function (MPHF) bijectively maps a set S of objects to the first |S| integers. It can be used as a building block in databases and data compression.
Bez, Dominik   +3 more
core   +4 more sources

XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era

open access: yesCryptography, 2023
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj   +1 more source

General encoding of canonical k-mers

open access: yesPeer Community Journal, 2023
To index or compare sequences efficiently, often k-mers, i.e., substrings of fixed length k, are used. For efficient indexing or storage, k-mers are often encoded as integers, e.g., applying some bijective mapping between all possible σk k-mers and the ...
Wittler, Roland
doaj   +1 more source

Efficient Cancelable Template Generation Based on Signcryption and Bio Hash Function

open access: yesAxioms, 2022
Cancelable biometrics is a demanding area of research in which a cancelable template conforming to a biometric is produced without degrading the efficiency.
Vani Rajasekar   +5 more
doaj   +1 more source

Insights into molecular cluster materials with adamantane‐like core structures by considering dimer interactions

open access: yesJournal of Computational Chemistry, Volume 44, Issue 7, Page 843-856, March 15, 2023., 2023
Abstract A class of adamantane‐like molecular materials attracts attention because they exhibit an extreme non‐linear optical response and emit a broad white‐light spectrum after illumination with a continuous‐wave infrared laser source. According to recent studies, not only the nature of the cluster molecules, but also the macroscopic structure of the
Sebastian Schwan   +7 more
wiley   +1 more source

A Dynamic Repository Approach for Small File Management With Fast Access Time on Hadoop Cluster: Hash Based Extended Hadoop Archive

open access: yesIEEE Access, 2022
Small file processing in Hadoop is one of the challenging task. The performance of the Hadoop is quite good when dealing with large files because they require lesser metadata and consume less memory. But while dealing with enormous amount of small files,
Vijay Shankar Sharma   +4 more
doaj   +1 more source

A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks

open access: yesSensors, 2021
Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption.
Shimaa A. Abdel Hakeem   +2 more
doaj   +1 more source

EESSI: A cross‐platform ready‐to‐use optimised scientific software stack

open access: yesSoftware: Practice and Experience, Volume 53, Issue 1, Page 176-210, January 2023., 2023
Abstract Getting scientific software installed correctly and ensuring it performs well has been a ubiquitous problem for several decades now, which is compounded currently by the changing landscape of computational science with the (re‐)emergence of different microprocessor families, and the expansion to additional scientific domains like artificial ...
Bob Dröge   +5 more
wiley   +1 more source

Accelerating Minimal Perfect Hash Function Construction Using GPU Parallelization [PDF]

open access: yes, 2023
Eine Minimale Perfekte Hashfunktion (MPHF) bildet eine Menge von N Schlüsseln kollisionsfrei auf die Menge [N ] := {0, .., N − 1} ab. Diese Thesis leistet einen signifikanten Beitrag für den folgenden generischen MPHF Konstruktionsalgorithmus.
Hermann, Stefan
core   +2 more sources

Home - About - Disclaimer - Privacy