Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hash algorithms
biblio
Unit Regression Test Selection According To Different Hashing Algorithms
Submitted by aekwall on Mon, 06/08/2020 - 10:34am
Layout
hash algorithms
unit regression test selection
Testing process
regression test selection
in-depth review
hashing algorithms
hashing
resource usage
Manuals
security
Compositionality
regression analysis
testing
program testing
Force
Synchronization
pubcrawl
Resiliency
Software
biblio
Optimization of Hardware-oblivious and Hardware-conscious Hash-join Algorithms on KNL
Submitted by aekwall on Mon, 06/08/2020 - 10:34am
hardware-oblivious hash join algorithms
hash algorithms
parallel computing
multithreading
multicore servers
memory allocation
manycore platforms
KNL hardware characteristics
Knights Landing
hash join
Resiliency
hardware-conscious hash join algorithms
hardware architecture features
algorithm optimization
multi-threading
multiprocessing systems
Compositionality
storage management
parallel processing
pubcrawl
biblio
Hash Functions are Based on Three-Dimensional Stochastic Transformations
Submitted by aekwall on Mon, 06/08/2020 - 10:34am
stochastic methods-of-information security
input data blocks
level-of-elementary operations
memory size 4.0 Byte
output data blocks
parallel machines
pseudo-random sequence
resulting transformation
square and cube architecture
heterogeneous supercomputer technologies
stochastic protection methods
stochastic transformation
Supercomputers
three-dimensional bytes array
three-dimensional stochastic transformations
unpredictability injection
hash algorithms
Cryptography
effective protection
DOZENHASH hashing algorithm
3D stochastic transformations
Hash functions
Stochastic processes
Three-dimensional displays
Compositionality
pseudorandom number generators
statistical testing
random number generation
Generators
NIST
pubcrawl
Resiliency
information security
biblio
An Efficient Hash-Tree-Based Algorithm in Mining Sequential Patterns with Topology Constraint
Submitted by aekwall on Mon, 06/08/2020 - 10:34am
Sun
efficient hash-tree-based algorithm
hash tree efficiency
hash-tree based mining
hash-tree search method
mining efficiency
network physical connection data
sequential mining algorithm
sequential pattern mining
association rules
topology constraint
topology relation
topology structure
transmission network
transmission networks
warning Weblogs
hash algorithms
Pattern recognition
Resiliency
pubcrawl
internet
Business
trees (mathematics)
Data mining
network topology
network nodes
Conferences
Topology
telecommunication network topology
Compositionality
Hash functions
hash tree
tree searching
alarm association rules
biblio
Locality-Sensitive Hashing Scheme Based on Heap Sort of Hash Bucket
Submitted by aekwall on Mon, 06/08/2020 - 10:33am
locality-sensitive hashing algorithm
tree searching
tree search method
space complexity
Sorting
Resiliency
query processing
pubcrawl
Pattern recognition
NNS
nearest neighbour methods
nearest neighbor search
nearest neighbor query
machine learning
C2LSH
locality sensitive hashing
Image detection
Heapsort
heap sort of hash bucket algorithm
hash table
Hash functions
hash algorithms
file organisation
data sorting
Cryptography
computational complexity
Compositionality
biblio
Implement Time Based One Time Password and Secure Hash Algorithm 1 for Security of Website Login Authentication
Submitted by aekwall on Mon, 06/08/2020 - 10:33am
process user authentication
hash algorithms
word length 160.0 bit
Website login authentication
website
username
user passwords
user access rights
time-based one time password
time limit
Time Based One Time Password
time 30.0 s
SHA1
Secure Hash Algorithm 1 generate code
Secure Hash Algorithm 1
authorisation
information system access
factor authentication method
authentication process
account number
two-factor authentication
Compositionality
Information systems
message authentication
authentication
Web sites
pubcrawl
Resiliency
Cryptography
biblio
Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA
Submitted by aekwall on Mon, 06/08/2020 - 10:33am
hash
hash algorithms
SHA-2 hash functions
security analysis scheme
secure hash algorithm
randomness analyses
randomness
output hash
odd ratio tests
modified SHA
Merkle Damgård structure
high performance computing testbed
hash output
Cryptography
generated hash
famous secure hash algorithms SHA-1
CUDA parallel computing platform
corresponding hash function
Bayesian tests
Bayesian
SHA-1
Compositionality
parallel processing
pubcrawl
Resiliency
biblio
A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition
Submitted by aekwall on Mon, 06/08/2020 - 10:33am
high-speed packet classification requirement
classification speed
complex network conditions
existing classification schemes
geometric space partition
hash
hash matching
hash table
HGSP algorithm
classification performance
huge packets
hybrid packet classification algorithm
integrated space-ground network
ISGN
packet classification
tradition network
traditional Hicuts algorithm
hash algorithms
Communication networks
Memory management
security
Classification algorithms
network security
Resiliency
pubcrawl
pattern classification
pattern matching
computer network security
Decision trees
aerospace computing
Partitioning algorithms
Compositionality
tree data structures
Time complexity
aerospace communication
biblio
Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function
Submitted by aekwall on Mon, 06/08/2020 - 10:33am
Resistance
hash algorithms
permutation
One-way Function
message integrity
message authenticity
cryptographic hash functions
Cryptographic Hash Function
cellular automata based hashing algorithm
cellular automata
CABHA algorithm
Cryptography
Compositionality
digital signature
computer science
automata
finite element analysis
cryptographic applications
message authentication
pubcrawl
Resiliency
information security
biblio
Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal
Submitted by aekwall on Mon, 06/08/2020 - 10:32am
hash collisions
hash algorithms
web portal
SHA-1
secured web portal
salt generation
salt algorithm
password hashing
matrix encryption key
Internet security
hash tables
hash message
Hash Function
Cryptography
enhanced secure hash algorithm-512
file organisation
Hash functions
Compositionality
Portals
Ciphers
password
web applications
Databases
pubcrawl
Resiliency
encryption
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »