咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 34 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 74 篇 工学
    • 50 篇 计算机科学与技术...
    • 23 篇 电气工程
    • 15 篇 信息与通信工程
    • 14 篇 软件工程
    • 12 篇 机械工程
    • 5 篇 控制科学与工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 化学工程与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 网络空间安全
  • 5 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 2 篇 理学
    • 1 篇 化学
    • 1 篇 地理学
  • 2 篇 医学
    • 2 篇 临床医学

主题

  • 81 篇 hash code
  • 17 篇 hashing
  • 13 篇 image retrieval
  • 11 篇 scatter storage
  • 8 篇 cryptography
  • 7 篇 semantics
  • 6 篇 deep learning
  • 6 篇 searching
  • 6 篇 images
  • 4 篇 clustering
  • 4 篇 image
  • 4 篇 symbol table
  • 4 篇 imagery (psychot...
  • 4 篇 binary code
  • 4 篇 deep hashing
  • 3 篇 elliptic curve c...
  • 3 篇 task analysis
  • 3 篇 collisions
  • 3 篇 search
  • 3 篇 keys

机构

  • 3 篇 univ chinese aca...
  • 3 篇 hunan univ coll ...
  • 2 篇 key lab embedded...
  • 2 篇 univ. of califor...
  • 2 篇 microsoft resear...
  • 2 篇 univ s carolina ...
  • 2 篇 suny coll new pa...
  • 2 篇 karamanoglu mehm...
  • 2 篇 xidian univ sch ...
  • 2 篇 univ elect sci &...
  • 1 篇 inria
  • 1 篇 univ sci & techn...
  • 1 篇 university of sc...
  • 1 篇 fudan univ sch c...
  • 1 篇 dept. of comput....
  • 1 篇 univ queensland ...
  • 1 篇 bell telephone l...
  • 1 篇 chinese acad sci...
  • 1 篇 natl inst inform...
  • 1 篇 indiana universi...

作者

  • 3 篇 wang song
  • 3 篇 zhao huan
  • 3 篇 maurer w.d.
  • 2 篇 he lihuo
  • 2 篇 harauchi satoshi
  • 2 篇 yin hongzhi
  • 2 篇 nakajima shin
  • 2 篇 liu qi
  • 2 篇 zhang yan
  • 2 篇 lu wen
  • 2 篇 natarajan v.
  • 2 篇 okano kozo
  • 2 篇 bell james r.
  • 2 篇 bays c
  • 2 篇 ogata shinpei
  • 2 篇 lian defu
  • 2 篇 sekizawa toshifu...
  • 2 篇 he chao
  • 2 篇 chen shifeng
  • 2 篇 li keqin

语言

  • 80 篇 英文
  • 1 篇 中文
检索条件"主题词=Hash Code"
81 条 记 录,以下是11-20 订阅
排序:
Letters to the editor: Comments on 舠An Improved hash code for Scatter Storage舡
收藏 引用
Communications of the ACM 1968年 第5期11卷 378-378页
作者: Beyer, J.D. Maurer, W.D. Bamberger, Frank K. Bell Telephone Lab Holmdel NJ United States Univ. of California Berkeley United States Univ. of Chicago Chicago IL United States
No abstract available.
来源: 评论
A novel image hashing with low-rank sparse matrix decomposition and feature distance
收藏 引用
VISUAL COMPUTER 2025年 第3期41卷 1987-1998页
作者: Yu, Zixuan Tang, Zhenjun Liang, Xiaoping Zhang, Hanyun Sun, Ronghai Zhang, Xianquan Guangxi Normal Univ Key Lab Educ Blockchain & Intelligent Technol Minist Educ Guilin 541004 Peoples R China Guangxi Normal Univ Guangxi Key Lab Multisource Informat Min & Secur Guilin 541004 Peoples R China
Image hashing is an efficient technique of image processing for various applications, such as retrieval, copy detection and authentication. In this paper, we design a novel image hashing algorithm using LRSMD (low-ran... 详细信息
来源: 评论
Cybersecurity analysis using the blockchain algorithm in nuclear power plants to enhance safe operations
收藏 引用
ENERGY SOURCES PART A-RECOVERY UTILIZATION AND ENVIRONMENTAL EFFECTS 2025年 第1期47卷 782-792页
作者: Woo, Tae Ho Cyber Univ Korea Dept Mech & Control Engn 106 Bukchon Ro Seoul South Korea
The blockchain technology has been applied to nuclear power plants in which the cyber performance using the security analysis information is highly enhanced. Following this study, other kinds of information in the nuc... 详细信息
来源: 评论
Bilateral Cross hashing Image Retrieval Based on Principal Component Analysis
收藏 引用
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2025年 1-18页
作者: Yilmaz, Ahmet Karamanoglu Mehmetbey Univ Fac Engn Dept Comp Engn TR-70200 Karaman Turkiye
Image retrieval (IR) has become a crucial challenge in computer vision with the exponential growth of digital imagery. The existing methods employ a single hash source, which may overlook deep details in the image, an... 详细信息
来源: 评论
Learning Binary hash codes for Fast Anchor Link Retrieval across Networks  19
Learning Binary Hash Codes for Fast Anchor Link Retrieval ac...
收藏 引用
World Wide Web Conference (WWW)
作者: Wang, Yongqing Shen, Huawei Gao, Jinhua Cheng, Xueqi Chinese Acad Sci Inst Comp Technol CAS Key Lab Network Data Sci & Technol Beijing 100190 Peoples R China
Users are usually involved in multiple social networks, without explicit anchor links that reveal the correspondence among different accounts of the same user across networks. Anchor link prediction aims to identify t... 详细信息
来源: 评论
Learning hash codes with Listwise Supervision
Learning Hash Codes with Listwise Supervision
收藏 引用
IEEE International Conference on Computer Vision (ICCV)
作者: Wang, Jun Liu, Wei Sun, Andy X. Jiang, Yu-Gang IBM TJ Watson Res Ctr Business Analyt & Math Sci Yorktown Hts NY 10598 USA IBM TJ Watson Res Ctr Multimedia Analyt Yorktown Hts NY USA Georgia Inst Technol Sch Ind & Syst Engn Atlanta GA 30332 USA Fudan Univ Sch Comp Sci Shanghai Peoples R China
hashing techniques have been intensively investigated in the design of highly efficient search engines for large-scale computer vision applications. Compared with prior approximate nearest neighbor search approaches l... 详细信息
来源: 评论
LWDSA: light-weight digital signature algorithm for wireless sensor networks
收藏 引用
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES 2017年 第10期42卷 1629-1643页
作者: Lavanya, M. Natarajan, V. Anna Univ Dept Instrumentat Engn Madras 600025 Tamil Nadu India
The essential security mechanism in wireless sensor networks (WSNs) is authentication, where nodes can authenticate each other before transmitting a valid data to a sink. There are a number of public key authenticatio... 详细信息
来源: 评论
Fast image quality assessment via supervised iterative quantization method
收藏 引用
NEUROCOMPUTING 2016年 212卷 121-127页
作者: He, Lihuo Wang, Di Liu, Qi Lu, Wen Xidian Univ Sch Elect Engn Xian 710071 Peoples R China
No-reference/Blind image quality assessment (NR-IQA/BIQA) is significant for image processing and yet very challenging, especially for real-time application and big image data processing. Traditional NR-IQA metrics us... 详细信息
来源: 评论
A secure data transmission and efficient data balancing approach for 5G-based IoT data using UUDIS-ECC and LSRHS-CNN algorithms
收藏 引用
IET COMMUNICATIONS 2022年 第5期16卷 571-583页
作者: Yadav, Kusum Jain, Anurag Alharbi, Yasser Alferaidi, Ali Alkwai, Lulwah M. Ahmed, Nada Mohamed Osman Sid Hamad, Sawsan Ali Saad Univ Hail Coll Comp Sci & Engn Hail Saudi Arabia Univ Petr & Energy Studies Sch Comp Sci Dehra Dun 248007 Uttarakhand India
Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth. T... 详细信息
来源: 评论
Deep Semantic Multimodal hashing Network for Scalable Image-Text and Video-Text Retrievals
收藏 引用
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2023年 第4期34卷 1838-1851页
作者: Jin, Lu Li, Zechao Tang, Jinhui Nanjing Univ Sci & Technol Sch Comp Sci & Engn Nanjing 210094 Peoples R China
hashing has been widely applied to multimodal retrieval on large-scale multimedia data due to its efficiency in computation and storage. In this article, we propose a novel deep semantic multimodal hashing network (DS... 详细信息
来源: 评论