Results 51 to 60 of about 44,375 (171)

Iterative Universal Hash Function Generator for Minhashing

open access: yesCoRR, 2014
Minhashing is a technique used to estimate the Jaccard Index between two sets by exploiting the probability of collision in a random permutation. In order to speed up the computation, a random permutation can be approximated by using an universal hash function such as the $h_{a,b}$ function proposed by Carter and Wegman.
openaire   +2 more sources

Migration, Repression and Homosexual Sociability in Francoist Spain: An Analysis of the Case Files of the Special Courts of Barcelona (1965–1975)

open access: yesGender &History, EarlyView.
ABSTRACT In Spain, under General Franco's regime, homosexuality was regarded as an antisocial and dangerous behaviour. It was thus pursued both by the police and judicial courts. The Law on Vagrants and Crooks (1954) and, subsequently, the Law on Dangerousness and Social Rehabilitation (1970) constituted the legal mechanisms used by the dictatorship to
Jordi Mas Grau, Rafael Cáceres‐Feria
wiley   +1 more source

Aligning Transnational due Diligence: The EU Deforestation Regulation and Brazil's Fragmented Beef Governance

open access: yesGlobal Policy, EarlyView.
ABSTRACT Transnational due diligence regulations, such as the European Union Regulation on Deforestation‐Free Products (EUDR), are reshaping sustainability governance by transforming voluntary norms into binding global rules. Yet, their effectiveness depends on how well they align with domestic governance systems and on the power asymmetries that ...
John James Loomis   +2 more
wiley   +1 more source

Smart Chaining: Templing and Temple Search

open access: yesIEEE Access
Hash tables continue to be at the forefront of applications that require fast data lookup, but their usefulness in practice depends on effective collision resolution. Classical approaches like chaining (linked lists) and open addressing (linear/quadratic/
Rajeev Ranjan Kumar Tripathi   +4 more
doaj   +1 more source

Insider-proof encryption with applications for quantum key distribution

open access: yes, 2013
It has been pointed out that current protocols for device independent quantum key distribution can leak key to the adversary when devices are used repeatedly and that this issue has not been addressed. We introduce the notion of an insider-proof channel.
McKague, Matthew, Sheridan, Lana
core   +2 more sources

Variable‐Rate Texture Compression: Real‐Time Rendering with JPEG

open access: yesComputer Graphics Forum, EarlyView.
Abstract Although variable‐rate compressed image formats such as JPEG are widely used to efficiently encode images, they have not found their way into real‐time rendering due to special requirements such as random access to individual texels. In this paper, we investigate the feasibility of variable‐rate texture compression on modern GPUs using the ...
Elias Kristmann   +2 more
wiley   +1 more source

SPHGen: A Program Generator for Fast Polynomial Hash Functions

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Universal hash functions are a widely-used, fundamental building block in constructing more complex cryptographic schemes. This makes achieving high efficiency, both at the design and implementation level, an utmost priority.
Tommaso Pegolotti   +3 more
doaj   +1 more source

A new cryptosystem analogous to LUCELG and Cramer-Shoup [PDF]

open access: yes, 2009
A special group based on a linear recurrence equation plays an important role in modern cryptography. Its relation appeared differently in various cryptosystem.
Md. Said, Mohamad Rushdan   +1 more
core  

Entrepreneurial Market Leadership Claims, Cultural Resonance, and Investor Evaluations in Nascent Markets: The Goldilocks Effect

open access: yesJournal of Management Studies, EarlyView.
Abstract Cultural entrepreneurship research emphasizes entrepreneurs’ use of cultural resources to influence audience evaluations through resonance. However, the process by which such cultural resonance is achieved remains underexplored, particularly as an intermediary outcome.
Xiumei Li   +3 more
wiley   +1 more source

Quantum Period Finding is Compression Robust

open access: yes, 2021
We study quantum period finding algorithms such as Simon and Shor (and its variants Eker{\aa}-H{\aa}stad and Mosca-Ekert). For a periodic function $f$ these algorithms produce -- via some quantum embedding of $f$ -- a quantum superposition $\sum_x |x ...
May, Alexander, Schlieper, Lars
core  

Home - About - Disclaimer - Privacy