咨询与建议

限定检索结果

文献类型

  • 34 篇 期刊文献
  • 10 篇 会议

馆藏范围

  • 44 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 33 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 13 篇 电气工程
    • 7 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 测绘科学与技术
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
    • 1 篇 公安技术
  • 7 篇 理学
    • 4 篇 数学
    • 2 篇 生物学
    • 2 篇 统计学(可授理学、...
    • 1 篇 地球物理学
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学
    • 1 篇 音乐与舞蹈学

主题

  • 44 篇 hash coding
  • 9 篇 scatter storage
  • 8 篇 hashing
  • 7 篇 direct addressin...
  • 7 篇 image retrieval
  • 7 篇 hashing methods
  • 6 篇 information retr...
  • 6 篇 searching
  • 4 篇 key transformati...
  • 4 篇 randomizing
  • 4 篇 random access
  • 4 篇 hashing techniqu...
  • 4 篇 key-to-address t...
  • 3 篇 file addressing
  • 3 篇 keys
  • 3 篇 NOT FOUND
  • 3 篇 perfect hashing ...
  • 3 篇 direct access me...
  • 2 篇 reliability
  • 2 篇 ensemble learnin...

机构

  • 2 篇 xi an jiao tong ...
  • 2 篇 univ washington ...
  • 2 篇 shaanxi smart ne...
  • 2 篇 ibm research lab...
  • 1 篇 guangdong key la...
  • 1 篇 department of co...
  • 1 篇 sun yat sen univ...
  • 1 篇 lab. lisse ecole...
  • 1 篇 software consult...
  • 1 篇 yantai vocat col...
  • 1 篇 cmr tech campus ...
  • 1 篇 jiaotong univ sc...
  • 1 篇 xidian univ guan...
  • 1 篇 univ hosp div me...
  • 1 篇 alfred p. sloan ...
  • 1 篇 wuhan univ sci &...
  • 1 篇 yangzhou univ pe...
  • 1 篇 computer science...
  • 1 篇 ctr hosp univ se...
  • 1 篇 muroran inst tec...

作者

  • 3 篇 lum vy
  • 3 篇 xu dongyang
  • 2 篇 dai dawei
  • 2 篇 yuen pst
  • 2 篇 li donggen
  • 2 篇 pan yan
  • 2 篇 moreau jm
  • 2 篇 ritcey james a.
  • 2 篇 michelucci d
  • 1 篇 du anyu
  • 1 篇 zhang tao
  • 1 篇 xia shuyin
  • 1 篇 zhang ning
  • 1 篇 leteuff g
  • 1 篇 bloom bh
  • 1 篇 yang shang-ming
  • 1 篇 chen zhe
  • 1 篇 yin jian
  • 1 篇 ma lei
  • 1 篇 zobrist al

语言

  • 43 篇 英文
  • 1 篇 法文
检索条件"主题词=Hash coding"
44 条 记 录,以下是1-10 订阅
排序:
An Accurate and Efficient Face Recognition Method Based on hash coding  13
An Accurate and Efficient Face Recognition Method Based on H...
收藏 引用
13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)
作者: Zeng, Yan Cai, Xiaodong Chen, Yuelin Wang, Meng Guilin Univ Elect Technol Sch Mech & Elect Engn Guilin Guangxi Peoples R China
To improve the efficiency in face recognition with high-dimension features extracted from deep model, a fast recognition method based on hash coding is proposed. Different from others, the hash coding and the cascade ... 详细信息
来源: 评论
Efficient hash coding for Image Retrieval Based on Improved Center Generation and Contrastive Pre-training Knowledge Model  16th
Efficient Hash Coding for Image Retrieval Based on Improved ...
收藏 引用
16th International Conference on Knowledge Science, Engineering and Management (KSEM)
作者: Liu, Ye Pan, Yan Yin, Jian Sun Yat Sen Univ Sch Comp Sci & Engn Guangzhou Peoples R China Lizhi Inc Artificial Intelligence Dept Beijing Peoples R China Lizhi Inc Big Data Dept Guangzhou Peoples R China Sun Yat Sen Univ Sch Artificial Intelligence Zhuhai Peoples R China Guangdong Key Lab Big Data Anal & Proc Guangzhou Peoples R China
In image retrieval tasks, effective hash coding methods can achieve better similarity preservation, so as to gain efficient retrieval results. Existing methods are usually divided into constructing global center const... 详细信息
来源: 评论
Feature-Embedded hash coding for Secure Uplink Access in Grant-Free URLLC
Feature-Embedded Hash Coding for Secure Uplink Access in Gra...
收藏 引用
IEEE Global Communications Conference (GLOBECOM) on Advanced Technology for 5G Plus
作者: Xu, Dongyang Ren, Pinyi Xi An Jiao Tong Univ Sch Informat & Commun Engn Xian Peoples R China Shaanxi Smart Networks & Ubiquitous Access Res Ct Xian Peoples R China
In grant-free ultra-reliable low-latency communications (URLLC), pilot transmission at transmitter and pilot retrieval at receiver are two basic operations of uplink access over the air to support user activity detect... 详细信息
来源: 评论
The unfavourable effects of hash coding on CMAC convergence and compensatory measure
The unfavourable effects of hash coding on CMAC convergence ...
收藏 引用
IEEE International Conference on Intelligent Processing Systems
作者: Luo, Z Zhao, ZM Zhu, CG Chinese Acad Sci Dept Image Proc Inst Remote Sensing Applicat Beijing Peoples R China
In this paper, the unfavourable effects of hash coding on the convergence of CMAC learning are investigated in details based on the fact that CMAC learning is equivalent to the Gauss-Seidel iteration for solving a lin... 详细信息
来源: 评论
An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications
收藏 引用
EGYPTIAN INFORMATICS JOURNAL 2024年 27卷
作者: Cui, Lichao Liu, Mingxin Yantai Vocat Coll Dept Informat Engn Yantai Peoples R China State Nucl Elect Power Planning Design & Res Inst Beijing Peoples R China
The proliferation of medical imaging in clinical diagnostics has led to an overwhelming volume of image data, presenting a challenge for efficient storage, management, and retrieval. Specifically, the rapid growth in ... 详细信息
来源: 评论
A face attribute based recommendation system via integrating denoising autoencoder and hash coding
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2021年 90卷 107020-107020页
作者: Liu, Fan Chen, Zhiyu Ding, Yuhua Yang, Sai Zhang, Tao Hohai Univ Nanjing 210098 Peoples R China Nanjing Univ Sci & Technol Nanjing 210094 Peoples R China Nantong Univ Nantong 226019 Peoples R China Yangzhou Univ Yangzhou 225127 Jiangsu Peoples R China
Nowadays, with the rapid development of commerce, how to effectively improve the performance of an recommendation system has aroused great concern. However, traditional recommendation system requires users to log in t... 详细信息
来源: 评论
SPACE/TIME TRADE/OFFS IN hash coding WITH ALLOWABLE ERRORS
收藏 引用
COMMUNICATIONS OF THE ACM 1970年 第7期13卷 422-&页
作者: BLOOM, BH Computer Usage Company Newton Upper Falls MA
In this paper trade-offs among certain computational factors in hash coding are analyzed. The paradigm problem considered is that of testing a series of messages one-by-one for membership in a given set of messages. T... 详细信息
来源: 评论
DETERMINING EQUIVALENCE OF ALGEBRAIC EXPRESSIONS BY hash coding
收藏 引用
JOURNAL OF THE ACM 1971年 第4期18卷 549-&页
作者: MARTIN, WA Alfred P. Sloan School of Management Massachusetts Institute of Technology Cambridge Massachusetts
Let S be the set of rational exponential expressions with complex rational coefficients, single level exponentiation, and no division or element i in the exponents. Let p be a prime integer of the form 4q ~ 1, where q... 详细信息
来源: 评论
Lazy arithmetic
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 1997年 第9期46卷 961-975页
作者: Michelucci, D Moreau, JM Lab. LISSE Ecole des Mines de Saint-Etienne France
Finite-precision leads to many problems in geometric methods from CAD or Computational Geometry. Until now, using exact rational arithmetic was a simple, yet much too slow, solution to be of any practical use in real-... 详细信息
来源: 评论
An Adaptive and Asymmetric Residual hash for Fast Image Retrieval
收藏 引用
IEEE ACCESS 2019年 7卷 78942-78953页
作者: Cheng, Shuli Wang, Liejun Du, Anyu Xinjiang Univ Coll Informat Sci & Engn Urumqi 830046 Peoples R China
hashing algorithm has attracted great attention in recent years. In order to improve the query speed and retrieval accuracy, this paper proposes an adaptive and asymmetric residual hash (AASH) algorithm based on resid... 详细信息
来源: 评论