Results 31 to 40 of about 115,913 (217)
MOVE GENERATION WITH PERFECT HASH FUNCTIONS [PDF]
We present two new perfect hashing schemes that can be used for efficient bitboard move generation for sliding pieces in chess-like board games without the need to use rotated bitboards. Moreover, we show that simple variations of these schemes give minimal perfect hashing schemes.
Mark Levene, Trevor Fenner
openaire +2 more sources
Secure Authentication in the Smart Grid
Authenticated key agreement is a process in which protocol participants communicate over a public channel to share a secret session key, which is then used to encrypt data transferred in subsequent communications.
Mehdi Hosseinzadeh+4 more
doaj +1 more source
Learned Monotone Minimal Perfect Hashing [PDF]
A Monotone Minimal Perfect Hash Function (MMPHF) constructed on a set S of keys is a function that maps each key in S to its rank. On keys not in S, the function returns an arbitrary value.
P. Ferragina+3 more
semanticscholar +1 more source
Background Specialized data structures are required for online algorithms to efficiently handle large sequencing datasets. The counting quotient filter (CQF), a compact hashtable, can efficiently store k-mers with a skewed distribution.
Moustafa Shokrof+2 more
doaj +1 more source
A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security.
Man Chun Chow, Maode Ma
doaj +1 more source
Analyzing execution path non-determinism of the Linux kernel in different scenarios
Safety-critical systems play a significant role in industrial domains, and their complexity is increasing with advanced technologies such as Artificial Intelligence (AI).
Yucong Chen+5 more
doaj +1 more source
A Lightweight Three-Factor Authentication Scheme for WHSN Architecture
Wireless Healthcare Sensor Network (WHSN) is a benchmarking technology deployed to levitate the quality of lives for the patients and doctors. WHSN systems must fit IEEE 802.15.6 standard for specific application criteria, unlike some standard criteria ...
Abdullah M. Almuhaideb+1 more
doaj +1 more source
Quicksort, Largest Bucket, and Min-Wise Hashing with Limited Independence [PDF]
Randomized algorithms and data structures are often analyzed under the assumption of access to a perfect source of randomness. The most fundamental metric used to measure how "random" a hash function or a random number generator is, is its independence ...
A. Siegel+7 more
core +2 more sources
Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core +1 more source