Results 31 to 40 of about 966 (158)
Universal classes of hash functions
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieval on keys. The algorithm makes a random choice of hash function from a suitable class of hash functions. Given any sequence of inputs the expected time (averaging over all functions in the class) to store and retrieve elements is linear in the length of ...
Carter, J.Lawrence, Wegman, Mark N.
openaire +2 more sources
ABSTRACT For over two decades, firms have built platforms and engaged open innovation communities to improve and customize their products through widened participation in the design process. While the benefits of involving those outside a firm as co‐designers have been well described, how co‐design processes unfold over time at the boundary between ...
Eric Reynolds Brubaker +3 more
wiley +1 more source
The Message Authentication Code Based on Universal Hashing
The article covers the research of message authentication codes based on universal hashing. The new message authentication code algorithm is described here. The analysis of the algorithm is also provided in this article.
T. A. Bilyk, A. U. Nesterenko
doaj
Universal hashing and authentication codes [PDF]
In this paper (for a preliminary version see [Lect. Notes Comput. Sci. 576, 74-85 (1992; Zbl 0789.68050)]) the author studies the applications of universal hashing to the construction of unconditionally secure authentication codes without secrecy. He generalizes the construction given by \textit{M. N. Wegman} and \textit{J. L. Carter} [J. Comput. Syst.
openaire +2 more sources
Hash the Universe: Differentially Private Text Extraction with Feature Hashing
Abstract Using artificial intelligence for text extraction can often require handling privacy-sensitive text. To avoid revealing confidential information, data owners and practitioners can use differential privacy, a definition of privacy with provable guarantees.
Sam Fletcher +2 more
openaire +1 more source
ABSTRACT We perform bibliometric analysis on documents for 255 Regulatory Impact Analyzes (RIAs) prepared by the US Environmental Protection Agency (EPA) from 1980 through 2024. Using a series of automated information extraction methods, we extract references from these documents and match them to bibliographic records.
Tyler A. Scott, Sojeong Kim, Liza Wood
wiley +1 more source
Smart Chaining: Templing and Temple Search
Hash tables continue to be at the forefront of applications that require fast data lookup, but their usefulness in practice depends on effective collision resolution. Classical approaches like chaining (linked lists) and open addressing (linear/quadratic/
Rajeev Ranjan Kumar Tripathi +4 more
doaj +1 more source
Hash Property and Fixed-Rate Universal Coding Theorems [PDF]
submitted to IEEE Transactions on Information Theory, Mar. 2008.
Muramatsu, Jun, Miyake, Shigeki
openaire +2 more sources
Abstract As people age, there is a natural decline in cognitive functioning and brain structure. However, the relationship between brain function and cognition in older adults is neither straightforward nor uniform. Instead, it is complex, influenced by multiple factors, and can vary considerably from one person to another.
Monica Baciu, Elise Roger
wiley +1 more source
IDChat (Internet-Dependent Cryptographic Hybrid Authentication Technology) is a universal digital identity framework designed to eliminate costly and vulnerable SMS-based one-time passwords (OTPs).
Ben Rahman, Maryani, Thoyyibah T.
doaj +1 more source

