REGISTER | LOGIN
Home    Bloggers    Blogs    Article Archives    Messages    About Us   
Tw  |  Fb  |  In  |  Rss
Dennis Feucht

Neuronics: Distributed-Memory Addressing, Part 2

Dennis Feucht
SunitaT0
SunitaT0
3/31/2014 2:15:57 PM
User Rank
Master
Re: Cryptography
I am impressed with the method here, which can be used in memory compression. Even though there are plenty of compression tools available out there in the market, this method seems to be more promising when compared to others. Well, am unsure about one thing here  is its storage space. Otherwise this would make it to my list of fav method indeed!

 

50%
50%
SachinEE
SachinEE
3/31/2014 7:30:32 AM
User Rank
Master
Re: Clarification
In other systems that use hashing in memory compression and the acceleration of search functions, the main challenge when designing these systems is usually to either reduce the probability of collisions or ,if that is not possible, to reduce or eliminate the effects of such collisions so that the results are as accurate as possible. CMAC seems to have handled this by using an adaptive and evolving memory space that continues to fine tune itself on its own over time.

50%
50%
SachinEE
SachinEE
3/31/2014 7:23:03 AM
User Rank
Master
Re: Cryptography
To quote from this article "Hash coding works when the input space is large....and the number of values in input space actually used in small in comparison". In protecting systems from hackers who use 'hashing' techniques, the common practice is to do the reverse i.e. increasing the number of values used in the input space or, in simple language, using longer and more complex passwords with mixed characters.

50%
50%
samicksha
samicksha
3/19/2014 12:04:21 AM
User Rank
Artist
Re: Cryptography
I would like to refer hybrid signature schemes which are often used, and wherein a cryptographic hash function is computed, and only the resulting hash is digitally signed.

50%
50%
tzubair
tzubair
3/18/2014 4:22:18 AM
User Rank
Master
Re: Cryptography
"There are many ways to do this, but it is interesting to me that you can use the method for memory compression."

@eafpres1: Even I had always heard of hashing within the context of cryptography but it's interesting to see it being used for memory compression. I wonder how efficient is this method of compression compared to other compression tools out there. It'd be interesting to see if it offers more efficiency in terms of execution and storage space.

50%
50%
Netcrawl
Netcrawl
3/17/2014 6:26:36 AM
User Rank
Master
Re: Cryptography
@eafpres1 hash functions in cryptography are implemented in information security primarily to evaluate the integrity of data, authentication and other security mechanism, it has numerous applications-digital signatures, MAC and other forms of authentications. Hash functions is actually a "pure security topic", it great to know that we can use that method in memory compression. 

50%
50%
DaeJ
DaeJ
3/14/2014 11:28:05 PM
User Rank
Master
Re: Clarification
-Practical Application

I wonder which electronic computer or circuit currently use distributed-Memory Address. Unless there is some diagram or mathematic expression, it is not easy to understand addressing mapping for number, N.  When figuring out the practical application, it is more clarified for address mapping.

50%
50%
eafpres1
eafpres1
3/14/2014 12:51:02 AM
User Rank
Blogger
Cryptography
Hi Dennis--interesting application of a hash function.  I first encountered hash functions in crytopgrapy.  You hear about bad guys stealing databases of user names and passwords.  Almost always you'll read that the passwords were hashed.  There are many ways to do this, but it is interesting to me that you can use the method for memory compression.

50%
50%
D Feucht
D Feucht
3/13/2014 4:56:11 PM
User Rank
Blogger
Clarification
Hashing maps an n-space into a lower-dimensional space. Ideally, if it is possible, the mapping is one-to-one, but generally it is not. Albus's description of CMAC mapping - that it maps multiple points in the input space into one point in the output space - is correct and should be used for the remainder of the discussion.

50%
50%
More Blogs from Dennis Feucht
Previously we looked at the electronics and sensors involved in data acquisition systems (DASs). Now we look at what to do with the raw ADC data once it is acquired.
This is a tutorial presentation of principles of instrumentation that is typically multi-channel, medium to high resolution (12 to 20 bits) and relatively slow - slower than oscilloscopes in sample rate
Continuing the chat from last time, we turn now to a circuit-related topic, that of current waveforms. The typical converter input waveform is shown with a static (dc) component and a ripple (ac) component
Semiconductor companies have now had fully-differential amplifiers in their product lines for a few years, though these amplifiers have been in leading-edge electronics for decades. These diff-amps are differential not only at their input but also at their output, doubling output range.
flash poll
educational resources
 
follow Planet Analog on Twitter
Planet Analog Twitter Feed
like us on facebook
our partners
Planet Analog
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS