Japanese scientists develop scalable quantum LDPC error correction codes approaching the theoretical hashing bound.
A new class of highly efficient and scalable quantum low-density parity-check error correction codes, capable of performance ...
The multi-stage attack uses encrypted shellcode, steganography, and reflective DLL loads to deploy XWorm without leaving ...
This work presents an object placement and lookup method that achieves full placement flexibility, balanced load, low ...
"Smash: Flexible, Fast, and Resource-Efficient Placement and Lookup of Distributed Storage," by Yi Liu et al., introduces a storage system that is the first of its kind to apply minimal perfect ...
Abstract: Benefitting from the low storage cost and high retrieval efficiency, hash learning has become a widely used retrieval technology to approximate nearest neighbors. Within it, the cross-modal ...
Streaming giant Plex is urging its customers to change their passwords after it disclosed a data breach of one of its user databases. The company said in a post on Monday that it was aware of a ...
Abstract: Supervised hashing models for image-text retrieval are fundamental and versatile in social media analysis and cross-lingual web search. Among them, supervised bilinear drift hashing is one ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results