Sciweavers

59 search results - page 3 / 12
» Locality-sensitive hashing scheme based on p-stable distribu...
Sort
View
SIGIR
2012
ACM
11 years 8 months ago
Boosting multi-kernel locality-sensitive hashing for scalable image retrieval
Similarity search is a key challenge for multimedia retrieval applications where data are usually represented in high-dimensional space. Among various algorithms proposed for simi...
Hao Xia, Pengcheng Wu, Steven C. H. Hoi, Rong Jin
INFOCOM
2000
IEEE
13 years 10 months ago
Performance of Hashing-Based Schemes for Internet Load Balancing
Abstract—Load balancing is a key technique for improving Internet performance. Effective use of load balancing requires good traffic distribution schemes. We study the performan...
Zhiruo Cao, Zheng Wang, Ellen W. Zegura
ICIP
2003
IEEE
14 years 7 months ago
Dither-based secure image hashing using distributed coding
We propose an image hashing algorithm that is based on distributed compression principles. The algorithm assumes the availability of a robust feature vector extracted from the ima...
Mark Johnson, Kannan Ramchandran
FC
2004
Springer
120views Cryptology» more  FC 2004»
13 years 11 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
NOMS
2008
IEEE
115views Communications» more  NOMS 2008»
14 years 4 days ago
A scheme for dynamic monitoring and logging of topology information in Wireless Mesh Networks
—We propose a distributed monitoring scheme for an ad-hoc/MESH network topology, and design a Distributed Hash Table based Peer-to-Peer system to log the topology information. A ...
Cristian Popi, Olivier Festor