Hashing has yet to be widely accepted as a component of hard real-time systems and hardware implementations, due to still existing prejudices concerning the unpredictability of space and time requirements resulting from collisions. While in theory perfect hashing can provide optimal mapping, in practice, finding a perfect hash function is too expensive, especially in the context of high-speed applications. The introduction of hashing with multiple choices, d-left hashing and probabilistic table summaries, has caused a shift towards deterministic DRAM access. However, high amounts of rare and expensive high-speed SRAM need to be traded off for predictability, which is infeasible for many applications. In this paper we show that previous suggestions suffer from the false precondition of full generality. Our approach exploits four individual degrees of freedom available in many practical applications, especially hardware and high-speed lookups. This reduces the requirement of on-chip memory up to an order of magnitude and guarantees constant lookup and update time at the cost of only minute amounts of additional hardware. Our design makes efficient hash table implementations cheaper, more predictable, and more practical.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4441648 | PMC |
http://dx.doi.org/10.1186/s40064-015-0958-y | DOI Listing |
J Imaging
January 2025
RCAM Laboratory, Telecommunications Department, Sidi Bel Abbes University, Sidi Bel Abbes 22000, Algeria.
In recent years, deep-network-based hashing has gained prominence in image retrieval for its ability to generate compact and efficient binary representations. However, most existing methods predominantly focus on high-level semantic features extracted from the final layers of networks, often neglecting structural details that are crucial for capturing spatial relationships within images. Achieving a balance between preserving structural information and maximizing retrieval accuracy is the key to effective image hashing and retrieval.
View Article and Find Full Text PDFInt J Med Inform
January 2025
Centre for Primary Care and Public Health (Unisanté), University of Lausanne, Lausanne, Switzerland.
Background: Duplicate and near-duplicate medical documents are problematic in document management, clinical use, and medical research. In this study, we focus on multisourced medical documents in the context of a population-based cancer registry in Switzerland. Although the data collection process is well-regulated, the volume of transmitted documents steadily increases and the presence of full or near-duplicates slows down and complicates document processing.
View Article and Find Full Text PDFSensors (Basel)
December 2024
School of Information Science and Technology, Guangdong University of Foreign Studies, Guangzhou 510420, China.
The major task of a wireless sensor network (WSN) is data collection. Key predistribution (KP) is to establish pairwise keys for secure communication in a WSN, such that all collected data could be securely sent to a backend database. Most research on KP-like schemes is dedicated to enhancing resiliency against node capture attack (NA) and retaining the link connectivity in the meantime.
View Article and Find Full Text PDFSensors (Basel)
November 2024
Department of Electronics Engineering, Kookmin University, Seoul 02707, Republic of Korea.
The Industrial Internet of Things (IIoT) revolutionizes both industrial and residential operations by integrating AI (artificial intelligence)-driven analytics with real-time monitoring, optimizing energy usage, and significantly enhancing energy efficiency. This study proposes a secure IIoT framework that simultaneously predicts both active and reactive loads while also incorporating anomaly detection. The system is optimized for real-time deployment on an edge server, such as a single-board computer (SBC), as well as on a cloud or centralized server.
View Article and Find Full Text PDFPeerJ Comput Sci
November 2024
Faculty of Computing and Information Technology, Department of Information Technology, University of Sialkot, Sialkot, Pakistan.
Phrase search encryption enables users to retrieve encrypted data containing a sequence of consecutive keywords without decrypting, which plays an important role in cloud Internet of Things (IoT) systems. However, due to the sequential relationship between keywords in the phrase, phrase search and verification are more difficult than multi-keyword search. Furthermore, verification evidence is generated by the server in existing schemes, and cloud servers are generally considered untrustworthy, so the verification is unreliable.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!