咨询与建议

限定检索结果

文献类型

  • 34 篇 期刊文献
  • 10 篇 会议

馆藏范围

  • 44 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 33 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 13 篇 电气工程
    • 7 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 测绘科学与技术
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
    • 1 篇 公安技术
  • 7 篇 理学
    • 4 篇 数学
    • 2 篇 生物学
    • 2 篇 统计学(可授理学、...
    • 1 篇 地球物理学
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学
    • 1 篇 音乐与舞蹈学

主题

  • 44 篇 hash coding
  • 9 篇 scatter storage
  • 8 篇 hashing
  • 7 篇 direct addressin...
  • 7 篇 image retrieval
  • 7 篇 hashing methods
  • 6 篇 information retr...
  • 6 篇 searching
  • 4 篇 key transformati...
  • 4 篇 randomizing
  • 4 篇 random access
  • 4 篇 hashing techniqu...
  • 4 篇 key-to-address t...
  • 3 篇 file addressing
  • 3 篇 keys
  • 3 篇 NOT FOUND
  • 3 篇 perfect hashing ...
  • 3 篇 direct access me...
  • 2 篇 reliability
  • 2 篇 ensemble learnin...

机构

  • 2 篇 xi an jiao tong ...
  • 2 篇 univ washington ...
  • 2 篇 shaanxi smart ne...
  • 2 篇 ibm research lab...
  • 1 篇 guangdong key la...
  • 1 篇 department of co...
  • 1 篇 sun yat sen univ...
  • 1 篇 lab. lisse ecole...
  • 1 篇 software consult...
  • 1 篇 yantai vocat col...
  • 1 篇 cmr tech campus ...
  • 1 篇 jiaotong univ sc...
  • 1 篇 xidian univ guan...
  • 1 篇 univ hosp div me...
  • 1 篇 alfred p. sloan ...
  • 1 篇 wuhan univ sci &...
  • 1 篇 yangzhou univ pe...
  • 1 篇 computer science...
  • 1 篇 ctr hosp univ se...
  • 1 篇 muroran inst tec...

作者

  • 3 篇 lum vy
  • 3 篇 xu dongyang
  • 2 篇 dai dawei
  • 2 篇 yuen pst
  • 2 篇 li donggen
  • 2 篇 pan yan
  • 2 篇 moreau jm
  • 2 篇 ritcey james a.
  • 2 篇 michelucci d
  • 1 篇 du anyu
  • 1 篇 zhang tao
  • 1 篇 xia shuyin
  • 1 篇 zhang ning
  • 1 篇 leteuff g
  • 1 篇 bloom bh
  • 1 篇 yang shang-ming
  • 1 篇 chen zhe
  • 1 篇 yin jian
  • 1 篇 ma lei
  • 1 篇 zobrist al

语言

  • 43 篇 英文
  • 1 篇 法文
检索条件"主题词=Hash coding"
44 条 记 录,以下是31-40 订阅
排序:
Ensemble learning framework for image retrieval via deep hash ranking
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2023年 260卷
作者: Li, Donggen Dai, Dawei Chen, Jiancu Xia, Shuyin Wang, Guoyin Chongqing Univ Telecommun & Posts Coll Chongqing Key Lab Computat Intelligence Chongqing Peoples R China Chongqing Three Gorges Univ Key Lab Intelligent Informat Proc & Control Chongqing Peoples R China
Deep hashing combines feature extraction or representation with hash coding jointly, which can significantly improve the speed of large-scale image retrieval. However, we notice that compared with traditional retrieva... 详细信息
来源: 评论
Generating a Rotation Reduction Perfect hashing Function
收藏 引用
Mathematics Magazine 1995年 第1期68卷 35-41页
作者: Arlene Blasius
Click to increase image sizeClick to decrease image size
来源: 评论
A Study of Trie-Like Structures Under the Density Model
收藏 引用
The Annals of Applied Probability 1992年 第2期2卷 402-434页
作者: Luc Devroye
We consider random tries constructed from sequences of i.i.d. random variables with a common density $f$ on $\lbrack 0, 1 \rbrack$ (i.e., paths down the tree are carved out by the bits in the binary expansions of the ... 详细信息
来源: 评论
Assigning Driver's License Numbers
收藏 引用
Mathematics Magazine 1991年 第1期64卷 13-22页
作者: Joseph A. Gallian
Click to increase image sizeClick to decrease image size
来源: 评论
DETECTION OF COMBINED OCCURRENCES
收藏 引用
COMMUNICATIONS OF THE ACM 1977年 第1期20卷 31-35页
作者: ZOBRIST, AL CARLSON, FR UNIV SO CALIF LOS ANGELESCA 90007 UNIV ARIZONA TUCSONAZ 85721
Examines the detection of combined occurrences for a large number of changes of values of variables. Description of the two efficient solutions for the combined occurrences; Properties of the methods; Error analysis f... 详细信息
来源: 评论
KEY-TO-ADDRESS TRANSFORM TECHNIQUES - FUNDAMENTAL PERFORMANCE STUDY ON LARGE EXISTING FORMATTED FILES
收藏 引用
COMMUNICATIONS OF THE ACM 1971年 第4期14卷 228-&页
作者: LUM, VY YUEN, PST DODD, M IBM Research Lab. San Jose CA IBM Research Lab. San Jose CA IBM Research Lab. San Jose CA
Studies key-to-address transformation methods applied to a set of existing files. Correlation between the number of accesses required to get to a record and the number of overflows record created by a transformation; ... 详细信息
来源: 评论
COMMENTS ON PERFECT hashING FUNCTIONS - SINGLE PROBE RETRIEVING METHOD FOR STATIC SETS
收藏 引用
COMMUNICATIONS OF THE ACM 1979年 第2期22卷 104-104页
作者: ANDERSON, MR ANDERSON, MG COMSHARE INC ANN ARBORMI 48104
The article presents a study which discussed perfect hashing functions in computer science. The author said that possible difficulties in implementing Algorithm T may be avoided. The symbol \ indicates set difference.... 详细信息
来源: 评论
MINIMAL PERFECT hash FUNCTIONS MADE SIMPLE
收藏 引用
COMMUNICATIONS OF THE ACM 1980年 第1期23卷 17-19页
作者: CICHELLI, RJ Software Consulting Services Allentown PA
Presents a method for computing machine independent in minimal perfect hash functions. Application of compilers in filtering high frequency words in natural language processing; Presentation of examples on English wor... 详细信息
来源: 评论
ADDITIONAL RESULTS ON KEY-TO-ADDRESS TRANSFORM TECHNIQUES - FUNDAMENTAL PERFORMANCE STUDY ON LARGE EXISTING FORMATTED FILES
收藏 引用
COMMUNICATIONS OF THE ACM 1972年 第11期15卷 996-&页
作者: LUM, VY YUEN, PST IBM Research Lab. San Jose CA IBM Research Lab. San Jose CA
The article provides an analysis of key-to-address transformation techniques and the results of a performance study on large existing formatted files. The experimental results comparing six commonly used key-to-addres... 详细信息
来源: 评论
GENERAL PERFORMANCE ANALYSIS OF KEY-TO-ADDRESS TRANSFORMATION METHODS USING AN ABSTRACT FILE CONCEPT
收藏 引用
COMMUNICATIONS OF THE ACM 1973年 第10期16卷 603-612页
作者: LUM, VY IBM CORP RES LABMONTEREY & COTTLE RDSAN JOSECA 95193
This paper presents a new approach to the analysis of performance of the various key-to-address transformation methods. In this approach the keys in a file arc assumed to have been selected from the key space accordin... 详细信息
来源: 评论