Sciweavers

58 search results - page 3 / 12
» Fast Collect in the absence of contention
Sort
View
CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
13 years 8 months ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway
PPAM
2005
Springer
13 years 10 months ago
Total Exchange Performance Modelling Under Network Contention
Abstract. One of the most important collective communication patterns for scientific applications is the many to many, also called complete exchange. Although efficient All-to-All...
Luiz Angelo Steffenel, Grégory Mounié...
MLMI
2004
Springer
13 years 10 months ago
An Integrated Framework for the Management of Video Collection
Video document retrieval is now an active part of the domain of multimedia retrieval. However, unlike for other media, the management of a collection of video documents adds the pr...
Nicolas Moënne-Loccoz, Bruno Janvier, St&eacu...
ICIP
2003
IEEE
14 years 6 months ago
New image retrieval paradigm: logical composition of region categories
We present a novel framework for intelligent search and retrieval by image content composition. Very different from the existing Query-by-Example paradigm, logical queries are exp...
Julien Fauqueur, Nozha Boujemaa
CVDB
2004
ACM
13 years 10 months ago
Managing Video Collections at Large
Video document retrieval is now an active part of the domain of multimedia retrieval. However, unlike for other media, the management of a collection of video documents adds the p...
Nicolas Moënne-Loccoz, Bruno Janvier, St&eacu...