Results 31 to 40 of about 966 (158)

Universal classes of hash functions

open access: yesJournal of Computer and System Sciences, 1979
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieval on keys. The algorithm makes a random choice of hash function from a suitable class of hash functions. Given any sequence of inputs the expected time (averaging over all functions in the class) to store and retrieve elements is linear in the length of ...
Carter, J.Lawrence, Wegman, Mark N.
openaire   +2 more sources

Co‐Design at the Boundary: Understanding the Dynamics of Open Innovation Between Companies and Communities

open access: yesJournal of Product Innovation Management, EarlyView.
ABSTRACT For over two decades, firms have built platforms and engaged open innovation communities to improve and customize their products through widened participation in the design process. While the benefits of involving those outside a firm as co‐designers have been well described, how co‐design processes unfold over time at the boundary between ...
Eric Reynolds Brubaker   +3 more
wiley   +1 more source

The Message Authentication Code Based on Universal Hashing

open access: yesБезопасность информационных технологий, 2012
The article covers the research of message authentication codes based on universal hashing. The new message authentication code algorithm is described here. The analysis of the algorithm is also provided in this article.
T. A. Bilyk, A. U. Nesterenko
doaj  

Universal hashing and authentication codes [PDF]

open access: yesDesigns, Codes and Cryptography, 1994
In this paper (for a preliminary version see [Lect. Notes Comput. Sci. 576, 74-85 (1992; Zbl 0789.68050)]) the author studies the applications of universal hashing to the construction of unconditionally secure authentication codes without secrecy. He generalizes the construction given by \textit{M. N. Wegman} and \textit{J. L. Carter} [J. Comput. Syst.
openaire   +2 more sources

Hash the Universe: Differentially Private Text Extraction with Feature Hashing

open access: yes, 2022
Abstract Using artificial intelligence for text extraction can often require handling privacy-sensitive text. To avoid revealing confidential information, data owners and practitioners can use differential privacy, a definition of privacy with provable guarantees.
Sam Fletcher   +2 more
openaire   +1 more source

The Drivers of Science Referenced in US EPA Regulatory Impact Analyses: Open Access, Professional Popularity, and Agency Involvement

open access: yesRegulation &Governance, EarlyView.
ABSTRACT We perform bibliometric analysis on documents for 255 Regulatory Impact Analyzes (RIAs) prepared by the US Environmental Protection Agency (EPA) from 1980 through 2024. Using a series of automated information extraction methods, we extract references from these documents and match them to bibliographic records.
Tyler A. Scott, Sojeong Kim, Liza Wood
wiley   +1 more source

Smart Chaining: Templing and Temple Search

open access: yesIEEE Access
Hash tables continue to be at the forefront of applications that require fast data lookup, but their usefulness in practice depends on effective collision resolution. Classical approaches like chaining (linked lists) and open addressing (linear/quadratic/
Rajeev Ranjan Kumar Tripathi   +4 more
doaj   +1 more source

Hash Property and Fixed-Rate Universal Coding Theorems [PDF]

open access: yesIEEE Transactions on Information Theory, 2010
submitted to IEEE Transactions on Information Theory, Mar. 2008.
Muramatsu, Jun, Miyake, Shigeki
openaire   +2 more sources

Finding the Words: How Does the Aging Brain Process Language? A Focused Review of Brain Connectivity and Compensatory Pathways

open access: yesTopics in Cognitive Science, EarlyView.
Abstract As people age, there is a natural decline in cognitive functioning and brain structure. However, the relationship between brain function and cognition in older adults is neither straightforward nor uniform. Instead, it is complex, influenced by multiple factors, and can vary considerably from one person to another.
Monica Baciu, Elise Roger
wiley   +1 more source

IDChat: Toward a Universal, Multi-Biometric Digital Identity for Next-Generation Secure Communication in ASEAN

open access: yesIEEE Access
IDChat (Internet-Dependent Cryptographic Hybrid Authentication Technology) is a universal digital identity framework designed to eliminate costly and vulnerable SMS-based one-time passwords (OTPs).
Ben Rahman, Maryani, Thoyyibah T.
doaj   +1 more source

Home - About - Disclaimer - Privacy