咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 12 篇 会议

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21 篇 工学
    • 18 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 5 篇 电气工程
    • 4 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 网络空间安全
  • 5 篇 理学
    • 2 篇 数学
    • 1 篇 化学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 24 篇 hashing algorith...
  • 3 篇 image retrieval
  • 3 篇 security
  • 2 篇 scalability
  • 2 篇 network function...
  • 2 篇 bloom filter
  • 2 篇 search engines
  • 2 篇 blockchain
  • 2 篇 information auth...
  • 1 篇 internet of thin...
  • 1 篇 biological seque...
  • 1 篇 ethereum
  • 1 篇 deletions
  • 1 篇 euclidean distan...
  • 1 篇 laplace's method
  • 1 篇 documents' autom...
  • 1 篇 nearest neighbor...
  • 1 篇 mpi
  • 1 篇 .data points
  • 1 篇 storage utilizat...

机构

  • 2 篇 harvard univ cam...
  • 2 篇 carnegie mellon ...
  • 1 篇 polytech univ ba...
  • 1 篇 ain shams univ f...
  • 1 篇 intel labs santa...
  • 1 篇 ain shams univ f...
  • 1 篇 connectem inc sa...
  • 1 篇 helwan univ fac ...
  • 1 篇 univ catania dip...
  • 1 篇 ocean univ china...
  • 1 篇 department of co...
  • 1 篇 al zaytoonah uni...
  • 1 篇 univ rouen ea 41...
  • 1 篇 rca labs. prince...
  • 1 篇 southeast univ s...
  • 1 篇 tianjin univ col...
  • 1 篇 alexandru ioan c...
  • 1 篇 computer informa...
  • 1 篇 univ extremadura...
  • 1 篇 prince sultan un...

作者

  • 2 篇 lim hyeontaek
  • 2 篇 fan bin
  • 2 篇 wang ren
  • 2 篇 singh ajaypal
  • 2 篇 mitzenmacher mic...
  • 2 篇 kaminsky michael
  • 2 篇 andersen david g...
  • 2 篇 zhou dong
  • 1 篇 cao yuan
  • 1 篇 han lirong
  • 1 篇 gui jie
  • 1 篇 li peng
  • 1 篇 prema k. v
  • 1 篇 zarour mohammad
  • 1 篇 ahn dong h.
  • 1 篇 van wyk christop...
  • 1 篇 ramiro liscano
  • 1 篇 yeo haikal
  • 1 篇 qi heng
  • 1 篇 naik vaibhavi

语言

  • 23 篇 英文
  • 1 篇 其他
检索条件"主题词=hashing algorithms"
24 条 记 录,以下是1-10 订阅
排序:
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
收藏 引用
COMMUNICATIONS OF THE ACM 2008年 第1期51卷 117-122页
作者: Andoni, Alexandr Indyk, Piotr MIT Cambridge MA 02139 USA MIT Comp Sci & Artificial Intelligence Lab Theory Computat Grp Cambridge MA 02139 USA
In this article, we give an overview of efficient algorithms for the approximate and exact nearest neighbor problem. The goal is to preprocess a dataset of objects (e.g., images) so that later, given a new query objec... 详细信息
来源: 评论
Improving hashing algorithms for Similarity Search via MLE and the Control Variates Trick  13
Improving Hashing Algorithms for Similarity Search via MLE a...
收藏 引用
13th Asian Conference on Machine Learning (ACML)
作者: Kang, Keegan Kushnarev, Sergey Wong, Wei Pin Pratap, Rameshwar Yeo, Haikal Chen, Yijia Singapore Univ Technol & Design Engn Syst & Design Pillar Singapore Singapore Johns Hopkins Univ Dept Appl Math & Stat Baltimore MD 21218 USA Singapore Univ Technol & Design Sci Math & Technol Cluster Singapore Singapore IIT Mandi Sch Comp & Elect Engn Suran India Singapore Univ Technol & Design Singapore Singapore
hashing algorithms are continually used for large-scale learning and similarity search, with computationally cheap and better algorithms being proposed every year. In this paper we focus on hashing algorithms which in... 详细信息
来源: 评论
Light-weight hashing method for user authentication in Internet-of-Things
收藏 引用
AD HOC NETWORKS 2019年 第0期89卷 97-106页
作者: Rao, Vidya Prema, K., V Manipal Acad Higher Educ Manipal Inst Technol Dept Comp Sci & Engn Manipal 576104 Karnataka India
The goal of Internet-of-Things (IoT) is that every object across the globe be interconnected under the Internet Infrastructure. loT is expanding its application domain to range from environmental monitoring to industr... 详细信息
来源: 评论
STORAGE UTILIZATION IN A MEMORY HIERARCHY WHEN STORAGE ASSIGNMENT IS PERFORMED BY A hashing ALGORITHM
收藏 引用
COMMUNICATIONS OF THE ACM 1971年 第3期14卷 172-&页
作者: WILLIAMS, JG RCA Labs. Princeton NJ
The utilization of storage is studied in a two-level memory hierarchy. The first storage level, which is the fast store, is divided into a number of storage areas. When an entry is to be filed in the hierarchy, a hash... 详细信息
来源: 评论
The Complexity of hashing with Lazy Deletion
收藏 引用
ALGORITHMICA 1986年 第1-4期1卷 17-29页
作者: Van Wyk, Christopher J. Vitter, Jeffrey Scott AT&T Bell Labs Murray Hill NJ 07974 USA Brown Univ Dept Comp Sci Providence RI 02912 USA
We examine a version of the dynamic dictionary problem in which stored items have expiration times and can be removed from the dictionary once they have expired. We show that under several reasonable assumptions about... 详细信息
来源: 评论
An Innovative Attention-based Triplet Deep hashing Approach to Retrieve Histopathology Images
收藏 引用
JOURNAL OF IMAGING INFORMATICS IN MEDICINE 2024年 1-18页
作者: Alizadeh, Seyed Mohammad Helfroush, Mohammad Sadegh Celebi, M. Emre Shiraz Univ Technol Dept Elect Engn Shiraz Iran Univ Cent Arkansas Dept Comp Sci & Engn Conway AR 72035 USA
Content-based histopathology image retrieval (CBHIR) can assist in the diagnosis of different diseases. The retrieval procedure can be complex and time-consuming if high-dimensional features are required. Thus, hashin... 详细信息
来源: 评论
Towards Efficient hashing in Ethereum Smart Contracts  16
Towards Efficient Hashing in Ethereum Smart Contracts
收藏 引用
16th International Conference on Software Technologies (ICSOFT)
作者: Onica, Emanuel Schifirnet, Cosmin-Ionut Alexandru Ioan Cuza Univ Fac Comp Sci Iasi Romania
Ethereum is a popular public blockchain platform and currently the most significant featuring smart contract functionality. Smart contracts are small programs that are executed on the blockchain nodes, which can be us... 详细信息
来源: 评论
Cross-Scale Context Extracted hashing for Fine-Grained Image Binary Encoding  14
Cross-Scale Context Extracted Hashing for Fine-Grained Image...
收藏 引用
Asian Conference on Machine Learning (ACML)
作者: Xue, Xuetong Shi, Jiaying He, Xinxue Xu, Shenghui Pan, Zhaoming 7 Bldg Zhongguancun Software Pk West Beijing Peoples R China
Deep hashing has been widely applied to large-scale image retrieval tasks owing to efficient computation and low storage cost by encoding high-dimensional image data into binary codes. Since binary codes do not contai... 详细信息
来源: 评论
Learning to Hash With Dimension Analysis Based Quantizer for Image Retrieval
收藏 引用
IEEE TRANSACTIONS ON MULTIMEDIA 2021年 23卷 3907-3918页
作者: Cao, Yuan Qi, Heng Gui, Jie Li, Keqiu Tang, Yuan Yan Kwok, James Tin-Yau Ocean Univ China Sch Informat Sci & Engn Qingdao 266100 Peoples R China Dalian Univ Technol Sch Comp Sci & Technol Dalian 116023 Peoples R China Southeast Univ Sch Cyber Sci & Engn Nanjing 211189 Peoples R China Tianjin Univ Coll Intelligence & Comp Tianjin 300350 Peoples R China Univ Macao Dept Comp & Informat Sci Macau 999078 Peoples R China Hong Kong Univ Sci & Technol Dept Comp Sci & Engn Hong Kong 999077 Peoples R China
The last few years have witnessed the rise of the big data era, in which approximate nearest neighbor search is a fundamental problem in many applications, such as large-scale image retrieval. Recently, many research ... 详细信息
来源: 评论
rDBF: A r-Dimensional Bloom Filter for massive scale membership query
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2019年 136卷 100-113页
作者: Patgiri, Ripon Nayak, Sabuzima Borgohain, Samir Kumar Natl Inst Technol Silchar Dept Comp Sci & Engn Silchar 788010 Assam India
Bloom Filter is a data structure for membership filtering that is deployed in various domains to boost up the lookup performance and to lower the memory consumption. Bloom Filter has gained a massive popularity nowada... 详细信息
来源: 评论