咨询与建议

限定检索结果

文献类型

  • 24 篇 期刊文献
  • 6 篇 会议
  • 1 册 图书

馆藏范围

  • 31 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 21 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 8 篇 信息与通信工程
    • 5 篇 软件工程
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 土木工程
    • 2 篇 交通运输工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 测绘科学与技术
    • 1 篇 环境科学与工程(可...
  • 7 篇 理学
    • 5 篇 数学
    • 2 篇 生物学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 2 篇 农学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 31 篇 hashing algorith...
  • 4 篇 blockchain
  • 3 篇 image retrieval
  • 3 篇 binary codes
  • 3 篇 hash table
  • 2 篇 information hidi...
  • 2 篇 molecular hologr...
  • 2 篇 near-duplicate i...
  • 2 篇 collisions
  • 2 篇 approximate near...
  • 2 篇 coverless image ...
  • 2 篇 hqsar
  • 2 篇 pls
  • 2 篇 scalable cryptog...
  • 2 篇 watermarking
  • 2 篇 qsar
  • 1 篇 wordset hash
  • 1 篇 information syst...
  • 1 篇 cryptographic ar...
  • 1 篇 task scheduler

机构

  • 4 篇 jilin univ sch c...
  • 2 篇 minist educ key ...
  • 2 篇 shandong univ te...
  • 1 篇 nanjing inst tec...
  • 1 篇 peking univ shen...
  • 1 篇 dibon solut inc ...
  • 1 篇 univ windsor dep...
  • 1 篇 jilin univ key l...
  • 1 篇 zhejiang univ co...
  • 1 篇 eotvos lorand un...
  • 1 篇 kogakuin univ
  • 1 篇 szabist dubai de...
  • 1 篇 univ shanghai sc...
  • 1 篇 agh univ sci & t...
  • 1 篇 hohai univ coll ...
  • 1 篇 jilin univ key l...
  • 1 篇 natl dong hwa un...
  • 1 篇 chengdu univ inf...
  • 1 篇 department of el...
  • 1 篇 department of co...

作者

  • 5 篇 wang zhen
  • 4 篇 liu pingping
  • 3 篇 zhao hongwei
  • 2 篇 wu bin
  • 2 篇 wu nannan
  • 2 篇 yang xiaohan
  • 2 篇 tchorzewski jace...
  • 1 篇 zhang luming
  • 1 篇 qian chen
  • 1 篇 kamran rukshanda
  • 1 篇 shen jie
  • 1 篇 iacono mauro
  • 1 篇 liu wenhao
  • 1 篇 sun xingming
  • 1 篇 zhaoqing pan
  • 1 篇 ugochukwu nwosu ...
  • 1 篇 goyal s. b.
  • 1 篇 chen qiu
  • 1 篇 chawla varun
  • 1 篇 abdurrahman usma...

语言

  • 30 篇 英文
  • 1 篇 其他
检索条件"主题词=Hashing Algorithm"
31 条 记 录,以下是11-20 订阅
排序:
An efficient signed SSL/TLS-based data security in the cloud using LTT-DDBM and TECC
收藏 引用
International Journal of Information Technology (Singapore) 2024年 1-16页
作者: Tiwari, Chandra Sekhar Jha, Vijay Kumar Department of Computer Science and Engineering Birla Institute of Technology Mesra Ranchi India
Cloud Data Security (CDS) is a set of strategies for securing data from security threats. However, the previous works ignored the prevention of multiple cloud security attacks. To tackle this problem, an efficient sec... 详细信息
来源: 评论
Performance of Computing Hash-Codes with Chaotically-Trained Artificial Neural Networks  22nd
Performance of Computing Hash-Codes with Chaotically-Trained...
收藏 引用
22nd Annual International Conference on Computational Science (ICCS)
作者: Tchorzewski, Jacek Byrski, Aleksander Cracow Univ Technol Krakow Poland AGH Univ Sci & Technol Krakow Poland
The main goal of the research presented in this paper was to estimate the performance of applying neural networks trained with the usage of a chaotic model, that may serve as hashing functions. The Lorenz Attractor ch... 详细信息
来源: 评论
Blockchain technology development and implementation for global logistics operations: a reference model perspective
收藏 引用
JOURNAL OF GLOBAL OPERATIONS AND STRATEGIC SOURCING 2021年 第2期14卷 360-382页
作者: Kamran, Rukshanda Khan, Nasreen Sundarakani, Balan SZABIST Dubai Dept Informat Technol Dubai U Arab Emirates Univ Wollongong Dubai Fac Business Dubai U Arab Emirates
Purpose - Blockchain technology offers a lot of potential benefits in supply chain management. However, there is a need of a reference model which addresses the gaps in existing frameworks. This paper aims to propose ... 详细信息
来源: 评论
Authentication and Authorization in Modern Web Apps for Data Security Using Nodejs and Role of Dark Web
收藏 引用
Procedia Computer Science 2022年 215卷 781-790页
作者: Piyush Pant Anand Singh Rajawat S.B. Goyal Pradeep Bedi Chaman Verma Maria Simona Raboaca Florentina Magda Enescu School of Computer Sciences and Engineering Nashik Sandip University India Faculty of Information Technology City university Petaling Jaya 46100 Malaysia ICSI Energy Department National Research and Development Institute for Cryogenics and Isotopic Technologies 240050 Ramnicu Valcea Romania Department of Electronics Communications and Computers University of Pitesti Pitesti Romania
Authentication and Authorization are the base of security for all the Technologies present in this world today. Starting from your smartphone where a user authenticates himself before he could access the data inside t... 详细信息
来源: 评论
Deep Learning Triplet Ordinal Relation Preserving Binary Code for Remote Sensing Image Retrieval Task
收藏 引用
REMOTE SENSING 2021年 第23期13卷 4786-4786页
作者: Wang, Zhen Wu, Nannan Yang, Xiaohan Yan, Bingqi Liu, Pingping Shandong Univ Technol Sch Comp Sci & Technol Zibo 255000 Peoples R China Jilin Univ Key Lab Symbol Computat & Knowledge Engn Minist Educ Changchun 130012 Peoples R China Jilin Univ Sch Comp Sci & Technol Changchun 130012 Peoples R China
As satellite observation technology rapidly develops, the number of remote sensing (RS) images dramatically increases, and this leads RS image retrieval tasks to be more challenging in terms of speed and accuracy. Rec... 详细信息
来源: 评论
Complexification of eukaryote phenotype: Adaptive immuno-cognitive systems as unique Gödelian blockchain distributed ledger
收藏 引用
BioSystems 2022年 220卷 104718页
作者: Markose, Sheri M. University of Essex Wivenhoe Park Colchester Essex CO4 3SQ United Kingdom
The digitization of inheritable information in the genome has been called the ‘algorithmic take-over of biology’. The McClintock discovery that viral software based transposable elements that conduct cut-paste (tran... 详细信息
来源: 评论
Multi-copy Cuckoo hashing  35
Multi-copy Cuckoo Hashing
收藏 引用
IEEE 35th International Conference on Data Engineering (ICDE)
作者: Li, Dagang Du, Rong Liu, Ziheng Yang, Tong Cui, Bin Peking Univ Shenzhen Grad Sch SECE Shenzhen Peoples R China Shenzhen Key Lab Info Theory&Future Net Arch Shenzhen Peoples R China Peking Univ Dept Comp Sci Beijing Peoples R China
Cuckoo hashing is widely used for its worst-case constant lookup performance even at very high load. However at high load, collision resolution will involve lots of probes on item relocation and may still fail in the ... 详细信息
来源: 评论
An Improved hashing Method for Image Retrieval Based on Deep Neural Networks  18
An Improved Hashing Method for Image Retrieval Based on Deep...
收藏 引用
International Conference on Signal Processing and Machine Learning (SPML)
作者: Chen, Qiu Wang, Weidong Lee, Feifei Kogakuin Univ Tokyo Japan Univ Shanghai Sci & Technol Shanghai Peoples R China
hashing algorithm projects the vector of features onto the binary space that generate the binary codes to reduce calculating time. Thus hashing algorithm is widely used to improve retrieval efficiency in traditional i... 详细信息
来源: 评论
Man-machine dialogue system optimization based on cloud computing
收藏 引用
PERSONAL AND UBIQUITOUS COMPUTING 2018年 第5-6期22卷 937-942页
作者: Jin, Maozhu Wang, Hua Song, Lijun Li, Yuxue Zeng, Yucheng Sichuan Univ Business Sch Chengdu 610065 Sichuan Peoples R China Chengdu Univ Informat Technol Coll Commun Engn Chengdu 610065 Sichuan Peoples R China Sichuan Univ Sci & Engn Management Sch Zigong 643000 Peoples R China
This paper studies the optimization and implementation of human-machine dialog system based on cloud computing technology. Firstly, the coarse-perceived hash generation based on the formant frequency is studied, and t... 详细信息
来源: 评论
The Normalized Distance Preserving Binary Codes and Distance Table
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2017年 第2期33卷 499-515页
作者: Zhao, Hongwei Wang, Zhen Liu, Pingping Wu, Bin Jilin Univ Sch Comp Sci & Technol Changchun 130012 Peoples R China Jilin Univ Key Lab Symbol Computat & Knowledge Engn Ministy Educ Changchun 130012 Peoples R China
In the Euclidean space, the approximate nearest neighbors (ANN) search measures the similarity degree through computing the Euclidean distances, which owns high time complexity and large memory overhead. To address th... 详细信息
来源: 评论