Results 51 to 60 of about 44,375 (171)
Iterative Universal Hash Function Generator for Minhashing
Minhashing is a technique used to estimate the Jaccard Index between two sets by exploiting the probability of collision in a random permutation. In order to speed up the computation, a random permutation can be approximated by using an universal hash function such as the $h_{a,b}$ function proposed by Carter and Wegman.
openaire +2 more sources
ABSTRACT In Spain, under General Franco's regime, homosexuality was regarded as an antisocial and dangerous behaviour. It was thus pursued both by the police and judicial courts. The Law on Vagrants and Crooks (1954) and, subsequently, the Law on Dangerousness and Social Rehabilitation (1970) constituted the legal mechanisms used by the dictatorship to
Jordi Mas Grau, Rafael Cáceres‐Feria
wiley +1 more source
ABSTRACT Transnational due diligence regulations, such as the European Union Regulation on Deforestation‐Free Products (EUDR), are reshaping sustainability governance by transforming voluntary norms into binding global rules. Yet, their effectiveness depends on how well they align with domestic governance systems and on the power asymmetries that ...
John James Loomis +2 more
wiley +1 more source
Smart Chaining: Templing and Temple Search
Hash tables continue to be at the forefront of applications that require fast data lookup, but their usefulness in practice depends on effective collision resolution. Classical approaches like chaining (linked lists) and open addressing (linear/quadratic/
Rajeev Ranjan Kumar Tripathi +4 more
doaj +1 more source
Insider-proof encryption with applications for quantum key distribution
It has been pointed out that current protocols for device independent quantum key distribution can leak key to the adversary when devices are used repeatedly and that this issue has not been addressed. We introduce the notion of an insider-proof channel.
McKague, Matthew, Sheridan, Lana
core +2 more sources
Variable‐Rate Texture Compression: Real‐Time Rendering with JPEG
Abstract Although variable‐rate compressed image formats such as JPEG are widely used to efficiently encode images, they have not found their way into real‐time rendering due to special requirements such as random access to individual texels. In this paper, we investigate the feasibility of variable‐rate texture compression on modern GPUs using the ...
Elias Kristmann +2 more
wiley +1 more source
SPHGen: A Program Generator for Fast Polynomial Hash Functions
Universal hash functions are a widely-used, fundamental building block in constructing more complex cryptographic schemes. This makes achieving high efficiency, both at the design and implementation level, an utmost priority.
Tommaso Pegolotti +3 more
doaj +1 more source
A new cryptosystem analogous to LUCELG and Cramer-Shoup [PDF]
A special group based on a linear recurrence equation plays an important role in modern cryptography. Its relation appeared differently in various cryptosystem.
Md. Said, Mohamad Rushdan +1 more
core
Abstract Cultural entrepreneurship research emphasizes entrepreneurs’ use of cultural resources to influence audience evaluations through resonance. However, the process by which such cultural resonance is achieved remains underexplored, particularly as an intermediary outcome.
Xiumei Li +3 more
wiley +1 more source
Quantum Period Finding is Compression Robust
We study quantum period finding algorithms such as Simon and Shor (and its variants Eker{\aa}-H{\aa}stad and Mosca-Ekert). For a periodic function $f$ these algorithms produce -- via some quantum embedding of $f$ -- a quantum superposition $\sum_x |x ...
May, Alexander, Schlieper, Lars
core

