Artículos de revistas sobre el tema "HASH METHODS"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "HASH METHODS".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Safaryan, Olga, Larissa Cherckesova, Nikita Lyashenko, Pavel Razumov, Vladislav Chumakov, Boris Akishin y Andrey Lobodenko. "Modern Hash Collision CyberAttacks and Methods of Their Detection and Neutralization". Journal of Physics: Conference Series 2131, n.º 2 (1 de diciembre de 2021): 022099. http://dx.doi.org/10.1088/1742-6596/2131/2/022099.
Texto completoBlackburn, Simon R. "Perfect Hash Families: Probabilistic Methods and Explicit Constructions". Journal of Combinatorial Theory, Series A 92, n.º 1 (octubre de 2000): 54–60. http://dx.doi.org/10.1006/jcta.1999.3050.
Texto completoJinnai, Yuu y Alex Fukunaga. "On Hash-Based Work Distribution Methods for Parallel Best-First Search". Journal of Artificial Intelligence Research 60 (30 de octubre de 2017): 491–548. http://dx.doi.org/10.1613/jair.5225.
Texto completoLiu, Xingbo, Xiushan Nie, Yingxin Wang y Yilong Yin. "Jointly Multiple Hash Learning". Proceedings of the AAAI Conference on Artificial Intelligence 33 (17 de julio de 2019): 9981–82. http://dx.doi.org/10.1609/aaai.v33i01.33019981.
Texto completoFitas, Ricardo, Bernardo Rocha, Valter Costa y Armando Sousa. "Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification". Journal of Imaging 7, n.º 3 (8 de marzo de 2021): 48. http://dx.doi.org/10.3390/jimaging7030048.
Texto completoMa, Xian-Qin, Chong-Chong Yu, Xiu-Xin Chen y Lan Zhou. "Large-Scale Person Re-Identification Based on Deep Hash Learning". Entropy 21, n.º 5 (30 de abril de 2019): 449. http://dx.doi.org/10.3390/e21050449.
Texto completoUssatova, О., Ye Begimbayeva, S. Nyssanbayeva y N. Ussatov. "ANALYSIS OF METHODS AND PRACTICAL APPLICATION OF HASH FUNCTIONS". SERIES PHYSICO-MATHEMATICAL 5, n.º 339 (15 de octubre de 2021): 100–110. http://dx.doi.org/10.32014/2021.2518-1726.90.
Texto completoYARMILKO, Аndii, Inna ROZLOMII y Yuliya MYSIURA. "USAGE OF HASH METHODS IN THE CRYPTOGRAPHIC DATA ANALYSIS". Herald of Khmelnytskyi National University 303, n.º 6 (diciembre de 2021): 49–54. http://dx.doi.org/10.31891/2307-5732-2021-303-6-49-54.
Texto completoLong, Jun, Longzhi Sun, Liujie Hua y Zhan Yang. "Discrete Semantics-Guided Asymmetric Hashing for Large-Scale Multimedia Retrieval". Applied Sciences 11, n.º 18 (21 de septiembre de 2021): 8769. http://dx.doi.org/10.3390/app11188769.
Texto completoGabryel, Marcin, Konrad Grzanek y Yoichi Hayashi. "Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic". Journal of Artificial Intelligence and Soft Computing Research 10, n.º 4 (1 de octubre de 2020): 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.
Texto completoHe, Chao, Dalin Wang, Zefu Tan, Liming Xu y Nina Dai. "Cross-Modal Discrimination Hashing Retrieval Using Variable Length". Security and Communication Networks 2022 (9 de septiembre de 2022): 1–12. http://dx.doi.org/10.1155/2022/9638683.
Texto completoCao, Mingwei, Haiyan Jiang y Haifeng Zhao. "Hash Indexing-Based Image Matching for 3D Reconstruction". Applied Sciences 13, n.º 7 (2 de abril de 2023): 4518. http://dx.doi.org/10.3390/app13074518.
Texto completoAysu, Aydin y Patrick Schaumont. "Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms". IEEE Transactions on Computers 65, n.º 9 (1 de septiembre de 2016): 2925–31. http://dx.doi.org/10.1109/tc.2015.2500570.
Texto completoWang, Letian, Ziyu Meng, Fei Dong, Xiao Yang, Xiaoming Xi y Xiushan Nie. "Attention-Oriented Deep Multi-Task Hash Learning". Electronics 12, n.º 5 (4 de marzo de 2023): 1226. http://dx.doi.org/10.3390/electronics12051226.
Texto completoAbanga, Ellen Akongwin. "Symmetric, Asymmetric and Hash Functions". Advances in Multidisciplinary and scientific Research Journal Publication 10, n.º 4 (30 de noviembre de 2022): 55–60. http://dx.doi.org/10.22624/aims/digital/v10n4p7.
Texto completoTiwari, Harshvardhan. "Merkle-Damgård Construction Method and Alternatives". Journal of information and organizational sciences 41, n.º 2 (14 de diciembre de 2017): 283–304. http://dx.doi.org/10.31341/jios.41.2.9.
Texto completoZhou, Quan, Xiushan Nie, Yang Shi, Xingbo Liu y Yilong Yin. "Focusing on Detail: Deep Hashing Based on Multiple Region Details (Student Abstract)". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 10 (3 de abril de 2020): 13991–92. http://dx.doi.org/10.1609/aaai.v34i10.7268.
Texto completoLv, Fang, Yuliang Wei, Xixian Han y Bailing Wang. "Semi-supervised hash learning method with consistency-based dimensionality reduction". Advances in Mechanical Engineering 11, n.º 1 (enero de 2019): 168781401881917. http://dx.doi.org/10.1177/1687814018819170.
Texto completoShan, Xue, Pingping Liu, Yifan Wang, Qiuzhan Zhou y Zhen Wang. "Deep Hashing Using Proxy Loss on Remote Sensing Image Retrieval". Remote Sensing 13, n.º 15 (25 de julio de 2021): 2924. http://dx.doi.org/10.3390/rs13152924.
Texto completoRen, Yanduo, Jiangbo Qian, Yihong Dong, Yu Xin y Huahui Chen. "AVBH: Asymmetric Learning to Hash with Variable Bit Encoding". Scientific Programming 2020 (21 de enero de 2020): 1–11. http://dx.doi.org/10.1155/2020/2424381.
Texto completoZhu, Lei, Chaoqun Zheng, Xu Lu, Zhiyong Cheng, Liqiang Nie y Huaxiang Zhang. "Efficient Multi-modal Hashing with Online Query Adaption for Multimedia Retrieval". ACM Transactions on Information Systems 40, n.º 2 (30 de abril de 2022): 1–36. http://dx.doi.org/10.1145/3477180.
Texto completoThanalakshmi, P., R. Anitha, N. Anbazhagan, Woong Cho, Gyanendra Prasad Joshi y Eunmok Yang. "A Hash-Based Quantum-Resistant Chameleon Signature Scheme". Sensors 21, n.º 24 (16 de diciembre de 2021): 8417. http://dx.doi.org/10.3390/s21248417.
Texto completoFeng, Jiangfan y Wenzheng Sun. "Improved Deep Hashing with Scalable Interblock for Tourist Image Retrieval". Scientific Programming 2021 (14 de julio de 2021): 1–14. http://dx.doi.org/10.1155/2021/9937061.
Texto completoSteinebach, Martin. "A Close Look at Robust Hash Flip Positions". Electronic Imaging 2021, n.º 4 (18 de enero de 2021): 345–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.4.mwsf-345.
Texto completoBARNA, Andrii y Roman KAMINSKY. "ANALYSIS OF THE EFFICIENCY OF DATA CHUNKING METHODS FOR DATA DEDUBLICATION SYSTEMS". Herald of Khmelnytskyi National University. Technical sciences 315, n.º 6(1) (29 de diciembre de 2022): 24–27. http://dx.doi.org/10.31891/2307-5732-2022-315-6-24-27.
Texto completoChen, Yaxiong y Xiaoqiang Lu. "A Deep Hashing Technique for Remote Sensing Image-Sound Retrieval". Remote Sensing 12, n.º 1 (25 de diciembre de 2019): 84. http://dx.doi.org/10.3390/rs12010084.
Texto completoKahri, Fatma, Hassen Mestiri, Belgacem Bouallegue y Mohsen Machhout. "High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor". Journal of Circuits, Systems and Computers 25, n.º 04 (2 de febrero de 2016): 1650026. http://dx.doi.org/10.1142/s0218126616500262.
Texto completoLi, Hongming, Lilai Zhang, Hao Cao y Yirui Wu. "Hash Based DNA Computing Algorithm for Image Encryption". Applied Sciences 13, n.º 14 (23 de julio de 2023): 8509. http://dx.doi.org/10.3390/app13148509.
Texto completoPark, Si-Hyeon, Seong-Min You, Dong-Ho Song y Kwangjae Lee. "Image-based Approaches for Identifying Harmful Sites using OCR and Average Hash Methods". TRANSACTION OF THE KOREAN INSTITUTE OF ELECTRICAL ENGINEERS P 72, n.º 2 (30 de junio de 2023): 112–19. http://dx.doi.org/10.5370/kieep.2023.72.2.112.
Texto completoDuan, Lijuan, Chongyang Zhao, Jun Miao, Yuanhua Qiao y Xing Su. "Deep Hashing Based Fusing Index Method for Large-Scale Image Retrieval". Applied Computational Intelligence and Soft Computing 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/9635348.
Texto completoChen, Ye. "Research of Data Storage and Querying Methods Based on Ring Distributed Hash". Open Automation and Control Systems Journal 7, n.º 1 (14 de septiembre de 2015): 1203–9. http://dx.doi.org/10.2174/1874444301507011203.
Texto completoColbourn, Charles J., Erin Lanus y Kaushik Sarkar. "Asymptotic and constructive methods for covering perfect hash families and covering arrays". Designs, Codes and Cryptography 86, n.º 4 (26 de mayo de 2017): 907–37. http://dx.doi.org/10.1007/s10623-017-0369-x.
Texto completoWei, Hongjian y Yingping Huang. "Online Multiple Object Tracking Using Spatial Pyramid Pooling Hashing and Image Retrieval for Autonomous Driving". Machines 10, n.º 8 (9 de agosto de 2022): 668. http://dx.doi.org/10.3390/machines10080668.
Texto completoPatil, Vedika, Sakshi Jain y Yogita Shah. "Secure Cryptography by Using Hash Application". Journal of Cyber Security in Computer System 1, n.º 1 (11 de mayo de 2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.
Texto completoNi, Li Shun y Bing Chen. "Design and Implementation of the Network Electronic Identity Management System". Applied Mechanics and Materials 548-549 (abril de 2014): 1334–38. http://dx.doi.org/10.4028/www.scientific.net/amm.548-549.1334.
Texto completoNkouankou, Aboubakar, Fotso Clarice, Wadoufey Abel y René Ndoundam. "Pre-image attack of the MD5 hash function by proportional logic". International Journal of Research and Innovation in Applied Science 07, n.º 08 (2022): 20–25. http://dx.doi.org/10.51584/ijrias.2022.7802.
Texto completoTan, Xiaoyan, Yun Zou, Ziyang Guo, Ke Zhou y Qiangqiang Yuan. "Deep Contrastive Self-Supervised Hashing for Remote Sensing Image Retrieval". Remote Sensing 14, n.º 15 (29 de julio de 2022): 3643. http://dx.doi.org/10.3390/rs14153643.
Texto completoQi, Xiaojun, Xianhua Zeng, Shumin Wang, Yicai Xie y Liming Xu. "Cross-modal variable-length hashing based on hierarchy". Intelligent Data Analysis 25, n.º 3 (20 de abril de 2021): 669–85. http://dx.doi.org/10.3233/ida-205162.
Texto completoYevseiev, Serhii, Alla Havrylova, Olha Korol, Oleh Dmitriiev, Oleksii Nesmiian, Yevhen Yufa y Asadi Hrebennikov. "Research of collision properties of the modified UMAC algorithm on crypto-code constructions". EUREKA: Physics and Engineering, n.º 1 (10 de enero de 2022): 34–43. http://dx.doi.org/10.21303/2461-4262.2022.002213.
Texto completoGórniak, Dawid y Piotr Kopniak. "Comparing the speed of the selected hash and encryption algorithms". Journal of Computer Sciences Institute 4 (30 de septiembre de 2017): 82–86. http://dx.doi.org/10.35784/jcsi.598.
Texto completoSong, Gyeong Ju, Min Ho Song y Hwa Jeong Seo. "Comparative analysis of quantum circuit implementation for domestic and international hash functions". Korean Institute of Smart Media 12, n.º 2 (30 de marzo de 2023): 83–90. http://dx.doi.org/10.30693/smj.2023.12.2.83.
Texto completoZhang, Lifang, Qi Shen, Defang Li, Guocan Feng, Xin Tang y Patrick S. Wang. "Adaptive Hashing with Sparse Modification for Scalable Image Retrieval". International Journal of Pattern Recognition and Artificial Intelligence 31, n.º 06 (30 de marzo de 2017): 1754011. http://dx.doi.org/10.1142/s0218001417540118.
Texto completoWang, Dan. "Recognition and Error Correction Techniques for Piano Playing Music Based on Convolutional Cyclic Hashing Method". Wireless Communications and Mobile Computing 2022 (9 de abril de 2022): 1–11. http://dx.doi.org/10.1155/2022/5660961.
Texto completoFitriyanto, Rachmad, Anton Yudhana y Sunardi Sunardi. "Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation". Jurnal Online Informatika 4, n.º 1 (6 de septiembre de 2019): 16. http://dx.doi.org/10.15575/join.v4i1.304.
Texto completoXu, Yang, Lei Zhu, Zhiyong Cheng, Jingjing Li y Jiande Sun. "Multi-Feature Discrete Collaborative Filtering for Fast Cold-Start Recommendation". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 01 (3 de abril de 2020): 270–78. http://dx.doi.org/10.1609/aaai.v34i01.5360.
Texto completoHuang, Xiaoli, Haibo Chen y Zheng Zhang. "Design and Application of Deep Hash Embedding Algorithm with Fusion Entity Attribute Information". Entropy 25, n.º 2 (15 de febrero de 2023): 361. http://dx.doi.org/10.3390/e25020361.
Texto completoChoi, Jong-Hyeok, Fei Hao y Aziz Nasridinov. "HI-Sky: Hash Index-Based Skyline Query Processing". Applied Sciences 10, n.º 5 (2 de marzo de 2020): 1708. http://dx.doi.org/10.3390/app10051708.
Texto completoSun, Li y Bing Song. "Feature adaptive multi-view hash for image search". Electronic Research Archive 31, n.º 9 (2023): 5845–65. http://dx.doi.org/10.3934/era.2023297.
Texto completoSuhaili, Shamsiah y Norhuzaimin Julai. "FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation". Pertanika Journal of Science and Technology 30, n.º 1 (10 de enero de 2022): 581–603. http://dx.doi.org/10.47836/pjst.30.1.32.
Texto completoTang, Xu, Chao Liu, Jingjing Ma, Xiangrong Zhang, Fang Liu y Licheng Jiao. "Large-Scale Remote Sensing Image Retrieval Based on Semi-Supervised Adversarial Hashing". Remote Sensing 11, n.º 17 (1 de septiembre de 2019): 2055. http://dx.doi.org/10.3390/rs11172055.
Texto completo