Results 81 to 90 of about 569,401 (216)
Place as a Metaphysical Problem in Albert the Great and Thomas Aquinas
Abstract Thomas Aquinas’ particular synthesis of Aristotelianism and Neoplatonism, and the intellectual tradition it inaugurated, has at least twice faced critical challenges from developments in physics. Besieged by the sixteenth and seventeenth century novatores and more or less ignored by the nineteenth‐ and twentieth‐century practitioners of ...
Onsi Aaron Kamel
wiley +1 more source
Perfect Hashing for Data Management Applications [PDF]
Perfect hash functions can potentially be used to compress data in connection with a variety of data management tasks. Though there has been considerable work on how to construct good perfect hash functions, there is a gap between theory and practice among all previous methods on minimal perfect hashing.
arxiv
This study develops engineered glioblastoma organoids to investigate the role of specific mutations in tumor progression. The analytic framework spans single‐cell analysis, spatial transcriptomics, single‐cell trajectory analysis, orthotopic implantation, clinically oriented imaging, and histopathological analysis.
Matthew Ishahak+10 more
wiley +1 more source
Distortion-Resistant Hashing for rapid search of similar DNA subsequence [PDF]
One of the basic tasks in bioinformatics is localizing a short subsequence $S$, read while sequencing, in a long reference sequence $R$, like the human geneome. A natural rapid approach would be finding a hash value for $S$ and compare it with a prepared database of hash values for each of length $|S|$ subsequences of $R$.
arxiv
An Improved Algorithm for Generating Minimal Perfect Hash Functions [PDF]
A minimal perfect hash function (MPHF) is a function from a set of M objects to the first M non-negative integers. MPHF\u27s are useful for the compact storage and fast retrieval of frequently used objects such as reserved words in a programming language
Sager, Thomas J.
core +1 more source
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni+2 more
wiley +1 more source
The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits.
Akinwale, A. T., Ibharalu, F. T.
core +1 more source
Finding succinct ordered minimal perfect hashing functions [PDF]
An ordered minimal perfect hash table is one in which no collisions occur among a predefined set of keys, no space is unused, and the data are placed in the table in order. A new method for creating ordered minimal perfect hashing functions is presented.
Hirschberg, Daniel S., Seiden, Steven S.
core
Cache-Oblivious Peeling of Random Hypergraphs
The computation of a peeling order in a randomly generated hypergraph is the most time-consuming step in a number of constructions, such as perfect hashing schemes, random $r$-SAT solvers, error-correcting codes, and approximate set encodings.
Belazzougui, Djamal+4 more
core +1 more source