Limpar
625 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Chia‐Chen Chang, C. Y. Chen,

... Disc Modulo (GDM) allocation method for multiple key hashing (MKH) files on multi-disc systems. A very important performance ...

Tópico(s): Data Management and Algorithms

1987 - Oxford University Press | The Computer Journal

Artigo Revisado por pares

Chia‐Chen Chang, Cheng–Ying Chen,

... introduce the concept of k-ary multiple key hashing (MKH) files and the disk modulo (DM) allocation method. It ...

Tópico(s): Advanced Data Storage Technologies

1991 - Elsevier BV | Information Sciences

Artigo Revisado por pares

Je-Hao Wang, Tak-Sun Yuen, Di Du,

... for locating and organizing the records. A linear hashing file does not employ any directory and its primary ... contiguous, therefore the data area of a linear hashing file corresponds closely to the disk space on a ...

Tópico(s): Data Management and Algorithms

1987 - IEEE Computer Society | IEEE Transactions on Software Engineering

Artigo Revisado por pares

Cheng–Ying Chen, Chin‐Chen Chang, R.C.T Lee,

... an important dynamic file, namely the multiple key hashing (MKH) file and the extendible hashing (EH) file, for answering ORQs. Based upon these performance formulas, ...

Tópico(s): Algorithms and Data Compression

1993 - Elsevier BV | Information Systems

Capítulo de livro Revisado por pares

Jin-Deog Kim, Sang-Ho Moon, Jin-Oh Choi,

... paper proposes a spatial index called MHF(Multilevel Hashing File) for the mobile map service. The MHF has a simple structure for storage utilization and uses a hashing technique for search efficiency. This paper also designs ...

Tópico(s): Advanced Image and Video Retrieval Techniques

2005 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Chia‐Chen Chang, H. F. Lin, C. Y. Chen,

Multiple key hashing files have been shown to exhibit attractive properties for partial match retrieval. The Disc Modulo (DM) allocation method has ... to facilitate partial match retrieval for multiple key hashing files on multiple discs. In this paper, it is ... method is optimal for k-ary multiple key hashing files under the condition that k ≡ (0 or 1 ...

Tópico(s): Cryptography and Data Security

1992 - Oxford University Press | The Computer Journal

Artigo Acesso aberto

Simson Garfinkel, Michael McCarrin,

... than the hashes of entire files. Unlike whole-file hashing, hash-based carving can identify files that are fragmented, files that are incomplete, or ...

Tópico(s): Digital Media Forensic Detection

2015 - Elsevier BV | Digital Investigation

Artigo Revisado por pares

Di Du, Sheau‐Ru Tong,

... compared to the extendible hashing and the extendible hashing tree schemes. The simulation results reveal that the proposed scheme is superior than the other two with respect to directory space utilization, especially for files with nonuniform record distribution. This scheme can be ...

Tópico(s): Peer-to-Peer Network Technologies

1991 - IEEE Computer Society | IEEE Transactions on Knowledge and Data Engineering

Artigo Acesso aberto

Anuj Kumar Yadav, Ritika Ritika, Mada Garg,

... file into blocks, encoding the file, generation of hashing on the file and application of signature on the data.The ...

Tópico(s): Cloud Data Security Solutions

2019 - Lavoisier publishing | Ingénierie des systèmes d information

Artigo Revisado por pares

Chin‐Chen Chang, Dah‐Wei Su,

... for multi‐attribute files based upon multi‐key hashing functions and haphazard files respectively. Theoretical results show that the performance of multi‐attribute files based upon multiple key hashing functions is always superior to that of haphazard files.

Tópico(s): Advanced Image and Video Retrieval Techniques

1987 - Taylor & Francis | Journal of the Chinese Institute of Engineers

Artigo Acesso aberto Revisado por pares

Per-Åke Larson,

Linear hashing is a file structure for dynamic files. In this paper, a new, simple method for handling overflow records in connection with linear hashing is proposed. The method is based on linear ... studied by simulation. The algorithms for the basic file operations are very simple, and the overall performance is competitive with that of other variants of linear hashing.

Tópico(s): Caching and Content Delivery

1985 - Association for Computing Machinery | ACM Transactions on Database Systems

Artigo Acesso aberto Revisado por pares

Dipayan Dev, Ripon Patgiri,

... metadata locality using consistent hashing and locality-preserving hashing, keeps replicated metadata for excellent reliability, and dynamically distributes metadata among the NameNodes to keep load balancing. NameNode is a centralized heart of the Hadoop. Keeping the directory tree of all files, failure of which causes the single point of ...

Tópico(s): Peer-to-Peer Network Technologies

2016 - Springer Science+Business Media | Frontiers of Information Technology & Electronic Engineering

Artigo Acesso aberto Revisado por pares

Joel Young, Kristina Foster, Simson Garfinkel, Kevin D. Fairbanks,

Using an alternative approach to traditional file hashing, digital forensic investigators can hash individually sampled subject drives on sector boundaries and then check these hashes against a prebuilt database, making it possible to process raw media without reference to the underlying file system.

Tópico(s): Advanced Steganography and Watermarking Techniques

2012 - IEEE Computer Society | Computer

Artigo Brasil Produção Nacional Revisado por pares

Marcus Botacin, Vitor Hugo Galhardo Moia, Fabrício Ceschin, Marco Aurélio Amaral Henriques, André Grégio,

... g., instructions), leads to better classification results than hashing the entire binary file.

Tópico(s): Network Security and Intrusion Detection

2021 - Elsevier BV | Forensic Science International Digital Investigation

Artigo Acesso aberto Revisado por pares

Christos Faloutsos, Stavros Christodoulakis,

... a framework that includes primary key hashing, multiattribute hashing, and signature files. Our effort is to find the optimal signature ...

Tópico(s): Network Packet Processing and Optimization

1987 - Association for Computing Machinery | ACM Transactions on Database Systems

Artigo Revisado por pares

Tak-Sun Yuen, David Hung-Chang Du,

A hashing-based dynamic file structure is introduced for partial match retrieval using overflow bucket sharing. The sharing of overflow buckets is ...

Tópico(s): Advanced Data Storage Technologies

1986 - IEEE Computer Society | IEEE Transactions on Software Engineering

Artigo Acesso aberto Revisado por pares

Katarzyna Koptyra, Marek R. Ogiela,

... and resistance to forgery. This is achieved by hashing the whole file with embedded data, so the image cannot be ...

Tópico(s): Cloud Data Security Solutions

2020 - Multidisciplinary Digital Publishing Institute | Sensors

Artigo Revisado por pares

Keith Lawrence Kelley, Marek Rusinkiewicz,

The design and implementation of a multikey, extensible hashing file addressing scheme and its application as an access ...

Tópico(s): Caching and Content Delivery

1988 - IEEE Computer Society | IEEE Software

Artigo Revisado por pares

Kotagiri Ramamohanarao, John Shepherd, Ron Sacks‐Davis,

The average cost for answering partial-match queries can be dramatically reduced by storing multiple copies of the data, each with a different clustering. We analyse the cost benefits (in terms of page accesses) of this arrangement and present heuristic algorithms for determining a near-minimal-cost file organisation for a given probability distribution of queries. We also show how constraining the range of values for specific attributes affects the usefulness of maintaining multiple copies.

Tópico(s): Advanced Image and Video Retrieval Techniques

1990 - Springer Science+Business Media | BIT Numerical Mathematics

Artigo Acesso aberto Revisado por pares

Anitta Patience Namanya, Irfan Awan, Jules Pagna Disso, Muhammad Younas,

... that existing security systems are bypassed by malicious files. Similarity hashing has been adopted for sample triaging in malware ... used in malware analysis for portable executable (PE) files. Although each hashing technique produces interesting results, when applied independently, they ...

Tópico(s): Advanced Steganography and Watermarking Techniques

2019 - Elsevier BV | Future Generation Computer Systems

Revisão Acesso aberto Revisado por pares

Richard Enbody, Hang Du,

... while preserving the fast access times expected from hashing. Such a fast, dynamic file access scheme is needed to support modern database systems. This paper surveys dynamic file access scheme is needed to support modern database systems. This paper surveys dynamic hashing schemes and examines their critical design issues.

Tópico(s): Caching and Content Delivery

1988 - Association for Computing Machinery | ACM Computing Surveys

Artigo Revisado por pares

Di Du, S. Ghanta, K. Maly, S. M. Sharrock,

... file structure that combines and extends multikey extendible hashing and signature files to create a document-retrieval system that is ...

Tópico(s): Advanced Data Storage Technologies

1989 - IEEE Computer Society | IEEE Transactions on Knowledge and Data Engineering

Artigo Revisado por pares

Guang-Ho Cha, Chin‐Wan Chung,

... In addition to the HG-tree, the signature file and hashing technique are also employed to index keywords and ... combines and extends the HG-tree, the signature file, and the hashing scheme to support complex similarity queries. We also ...

Tópico(s): Data Management and Algorithms

1999 - Elsevier BV | Journal of Visual Communication and Image Representation

Artigo

Ekow Otoo,

article A multidimensional digital hashing scheme for files with composite keys Share on Author: Ekow J. Otoo School of Computer Science, Carleton University, Ottawa, Canada School of Computer ...

Tópico(s): Advanced Image and Video Retrieval Techniques

1985 - Association for Computing Machinery | ACM SIGMOD Record

Artigo Acesso aberto

Ian Shiel, Stephen O’Shaughnessy,

... produce a method to overcome the limitations of file-level similarity hashing, such as poor performance against obfuscated malware. Section- ... Portable Executable (PE) files and that section-level hashing and comparison produces considerably better results than at file-level.

Tópico(s): Network Security and Intrusion Detection

2019 - Elsevier BV | Digital Investigation

Artigo Revisado por pares

Hsiao Yeong-Shiou, Alan L. Tharp,

Adaptive hashing is a new file processing scheme which combines the organization of a B+-Tree with the operational algorithms of order-preserving linear hashing, and in so doing, it fully utilizes the advantages of both. Its performance, which can be controlled by a single parameter, is stable under all circumstances. Its storage utilization is nearly 80% at any time under any circumstances. No other file organization or algorithms are known which attain such ...

Tópico(s): Advanced Data Storage Technologies

1988 - Elsevier BV | Information Systems

Artigo Acesso aberto

Frank Olken, Doron Rotem, Ping Xu,

... hash files with separate overflow chains. The dynamic hashing methods considered are Linear Hash files [Lit80] and Extendible Hash files [FNPS79]. We give ... of the cost of successfully searching a hash file and show how to exploit features of the dynamic hashing methods to improve sampling efficiency.

Tópico(s): Advanced Image and Video Retrieval Techniques

1990 - Association for Computing Machinery | ACM SIGMOD Record

Artigo Acesso aberto Revisado por pares

M. Ramakrishna, Per-Åke Larson,

... overflows. We propose and analyze a composite perfect hashing scheme for large external files. The scheme guarantees retrieval of any record in ...

Tópico(s): Caching and Content Delivery

1989 - Association for Computing Machinery | ACM Transactions on Database Systems

Artigo Revisado por pares

Ye‐In Chang, Cheng‐Chi Lee,

... generalized approach for designing a class of dynamic hashing schemes which require no index and have the growth of a file at a rate of (n+1)/n per ... n is the number of pages of the file, as compared to a rate of 2 in linear hashing. Based on this generalized approach, we derive a ...

Tópico(s): Algorithms and Data Compression

1997 - IEEE Computer Society | IEEE Transactions on Knowledge and Data Engineering

Capítulo de livro Acesso aberto Revisado por pares

Hans‐Peter Kriegel, Michael Schiwietz, Ralf Schneider, Bernhard Seeger,

... types of queries: the R-tree, the BANG file, PLOP hashing and the BUDDY hash tree. The result presented two winners: the BANG file and the BUDDY hash tree. This comparison is ...

Tópico(s): Geographic Information Systems Studies

1990 - Springer Science+Business Media | Lecture notes in computer science