-
Explain how content-addressed tools like IPFS are able to deduplicate content by breaking it into chunks
- different senses of deduplication:
- deduplication of un-changed portions of file/da…
-
There are multiple places where chemical fingerprints are calculated in the ‘clm’ package, and this implies a decision about what fingerprinting algorithm to use. Currently, the code switches back and…
-
> Another area I started looking into (but haven't deeply explored yet) for both figuring out how to map variable names to sections of code in a 'smart' way, and potentially also for module identifica…
-
Currently images are referenced by hashing its content with sha-1 which gives totally different id to very similar images. In difference, I think perceptual image hashing is better alternative here.
…
-
In "Multiwall Motley-Keenan Simulation",we can use "f,a = C.show(fig=fig" to get a figure about the RSSI strength of each location in the room.How can I save the data in the form such as [position x,p…
-
Great Project!
I want to use this to get the ids of track from sets. So let's say I have the audio file of a set, how would I approach it? I would like to have something like a sliding window over …
-
**Is your feature request related to a problem? Please describe.**
We have a SA score demo script.
If would be nice if the SA score is more integrated into rdkit,
for example if it becomes one of t…
-
This repo looks really interesting, it's actually the only one I found about Audio Fingerprinting in Golang. I'm currently working on a small private project to index and recognize music.
Would you m…
-
```
- In this work we present Picasso: a lightweight device class fingerprinting protocol
that allows a server to verify the software and hardware stack of a mobile or desktop client.
- We address…
-
Nmap's traceroute algorithm works fastest if it starts with a TTL near the distance to the target. This can be gathered from encapsulated headers in an ICMP response to a UDP probe during the OS finge…