Search Results - Hashcode

Refine Results
  1. 1

    Contrast-Based Unsupervised Hashing Learning With Multi-Hashcode by Zhang, Xi, Wang, Xiumei, Cheng, Peitao

    ISSN: 1070-9908, 1558-2361
    Published: New York IEEE 2022
    Published in IEEE signal processing letters (2022)
    “…Due to high storage and calculation efficiency, hash-based methods have been widely used in image retrieval systems. Unsupervised deep hashing methods can…”
    Get full text
    Journal Article
  2. 2

    Insider Attack Monitoring and Secured Data Transfer Using KPCC and BiO‐ELSTM in Cloud Computing by Yalla, Rama Krishna Mani Kanta, Mamidala, Vijaykumar, Yallamelli, Akhil Raj Gaius, Devarajan, Mohanarangan Veerappermal, Ganesan, Thirusubramanian, Sambas, Aceng

    ISSN: 2161-3915, 2161-3915
    Published: Chichester, UK John Wiley & Sons, Ltd 01.04.2025
    “… This paper proposes a novel framework that integrates the Cyclic permutation‐based Hirose‐Streebog (CH‐Streebog) algorithm for secure logins and hashcode verification, alongside the KPCC method for securing cookie files…”
    Get full text
    Journal Article
  3. 3

    Orientation Hashcode and Articial Neural Network Based Combined Approach to Recognize Sign Language by Arif-Ul-Islam, Akhter, Shamim

    Published: IEEE 01.12.2018
    “… Among them, orientation based hashcode (OBH) model recognizes sign images at a lower time but with A lower accuracy…”
    Get full text
    Conference Proceeding
  4. 4

    Nearly-Unsupervised Hashcode Representations for Relation Extraction by Garg, Sahil, Galstyan, Aram, Greg Ver Steeg, Cecchi, Guillermo

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 09.09.2019
    Published in arXiv.org (09.09.2019)
    “…Recently, kernelized locality sensitive hashcodes have been successfully employed as representations of natural language text, especially showing high relevance to biomedical relation extraction tasks…”
    Get full text
    Paper
  5. 5

    Kernelized Hashcode Representations for Relation Extraction by Garg, Sahil, Galstyan, Aram, Greg Ver Steeg, Rish, Irina, Cecchi, Guillermo, Gao, Shuyang

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 20.05.2019
    Published in arXiv.org (20.05.2019)
    “…Kernel methods have produced state-of-the-art results for a number of NLP tasks such as relation extraction, but suffer from poor scalability due to the high…”
    Get full text
    Paper
  6. 6
  7. 7

    Modeling Psychotherapy Dialogues with Kernelized Hashcode Representations: A Nonparametric Information-Theoretic Approach by Garg, Sahil, Rish, Irina, Cecchi, Guillermo, Goyal, Palash, Ghazarian, Sarik, Gao, Shuyang, Greg Ver Steeg, Galstyan, Aram

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 09.09.2019
    Published in arXiv.org (09.09.2019)
    “…We propose a novel dialogue modeling framework, the first-ever nonparametric kernel functions based approach for dialogue modeling, which learns kernelized hashcodes as compressed text representations…”
    Get full text
    Paper
  8. 8

    Google HashCode Contest 2021: Omani Team Takes First Place at Arab Level

    Published: Ruwi Disco Digital Media, Inc 28.02.2021
    Published in Oman News Agency (28.02.2021)
    Get full text
    Newsletter
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Case Based Modeling of Answer Points to Expedite Semi-Automated Evaluation of Subjective Papers by Roy, Chhanda, Chaudhuri, Chitrita

    ISSN: 2473-3571
    Published: IEEE 01.12.2018
    “…Researches have been carried out in the past and recent years for the automation of examination systems. But most of them target on-line examinations with…”
    Get full text
    Conference Proceeding
  16. 16

    Large-Scale Supervised Hashing for Cross-Modal Retreival by Karbil, Loubna, Daoudi, Imane

    ISSN: 2161-5330
    Published: IEEE 01.10.2017
    “…Matrix factorization technique has become a promising approach for cross-modality hashing, where projections are learned to represent data from multiple…”
    Get full text
    Conference Proceeding
  17. 17

    Hashing and data integrity: Reliability of hashing and granularity size reduction by Malinowski, Christopher, Noble, Richard

    ISSN: 1742-2876, 1873-202X
    Published: Elsevier Ltd 01.06.2007
    Published in Digital investigation (01.06.2007)
    “…Data assurance have come under scrutiny due to attacks on hashing schemes. This article explores a methodology for increasing the attack difficulty as well as…”
    Get full text
    Journal Article
  18. 18

    Faster and space efficient indexing for locality sensitive hashing by Verma, Bhisham Dev, Pratap, Rameshwar

    ISSN: 0304-3975
    Published: Elsevier B.V 09.11.2025
    Published in Theoretical computer science (09.11.2025)
    “…) and cosine similarity (a.k.a. SRP). The index construction step of these LSHs relies on grouping data points into several bins of hash tables based on their hashcode…”
    Get full text
    Journal Article
  19. 19

    Semantic Cluster Unary Loss for Efficient Deep Hashing by Zhang, Shifeng, Li, Jianmin, Zhang, Bo

    ISSN: 1057-7149, 1941-0042, 1941-0042
    Published: United States IEEE 01.06.2019
    Published in IEEE transactions on image processing (01.06.2019)
    “… The hashing method maps similar data to binary hashcodes with smaller hamming distance, which has received broad attention due to its low storage cost and fast retrieval speed…”
    Get full text
    Journal Article
  20. 20

    FOG computing based energy efficient and secured iot data sharing using SGSOA and GMCC by Narla, Swapna, Peddi, Sreekar, Valivarthi, Dharma Teja, Kethu, Sai Sathish, Natarajan, Durai Rajesh, Kurniadi, Dede

    ISSN: 2210-5379
    Published: Elsevier Inc 01.06.2025
    “…A Free and open-source Ghost (FOG) computing is a decentralized computing infrastructure, that helps in processing the data efficiently to end-user. None of…”
    Get full text
    Journal Article