90   Artículos

 
en línea
Adil Redaoui, Amina Belalia and Kamel Belloulata    
Deep network-based hashing has gained significant popularity in recent years, particularly in the field of image retrieval. However, most existing methods only focus on extracting semantic information from the final layer, disregarding valuable structura... ver más
Revista: Information    Formato: Electrónico

 
en línea
Manar Aldaoud, Dawood Al-Abri, Medhat Awadalla and Firdous Kausar    
Named Data Networking (NDN) is a future Internet architecture that requires an Inter-Domain Routing (IDR) to route its traffic globally. Address resolution is a vital component of any IDR system that relies on a Domain Name System (DNS) resolver to trans... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Dereje Regassa, Heon Young Yeom and Junseok Hwang    
Recent advancements in memory technology have opened up a wealth of possibilities for innovation in data structures. The emergence of byte-addressable persistent memory (PM) with its impressive capacity and low latency has accelerated the adoption of PM ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
S. Velliangiri, P. Karthikeyan, Vinayakumar Ravi, Meshari Almeshari and Yasser Alzamil    
Medical service providers generate many healthcare records containing sensitive and private information about a patient?s health. The patient can allow healthcare service providers to generate healthcare data, which can be stored with healthcare service ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ibrahim Shawky Farahat, Waleed Aladrousy, Mohamed Elhoseny, Samir Elmougy and Ahmed Elsaid Tolba    
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets. Thus, in this pa... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hasan Hashim, Ahmad Reda Alzighaibi, Amaal Farag Elessawy, Ibrahim Gad, Hatem Abdul-Kader and Asmaa Elsaid    
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending atta... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Ketan Dalal, Luc Devroye and Ebrahim Malalla    
Linear probing continues to be one of the best practical hashing algorithms due to its good average performance, efficiency, and simplicity of implementation. However, the worst-case performance of linear probing seems to degrade with high load factors d... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Argyrios Sideris and Minas Dasygenis    
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Wenxiao Li, Hongyan Mei, Yutian Li, Jiayao Yu, Xing Zhang, Xiaorong Xue and Jiahao Wang    
Due to the fast retrieval speed and low storage cost, cross-modal hashing has become the primary method for cross-modal retrieval. Since the emergence of deep cross-modal hashing methods, cross-modal retrieval significantly improved. However, the existin... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mario Alviano    
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values wi... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 5     Siguiente »