Sciweavers

150 search results - page 6 / 30
» Coherency Sensitive Hashing
Sort
View
ICDCSW
2003
IEEE
15 years 2 months ago
A Study of the Performance and Parameter Sensitivity of Adaptive Distributed Caching
A self-organized approach to manage a distributed proxy system called Adaptive Distributed Caching (ADC) has been proposed previously. We model each proxy as an autonomous agent th...
Markus J. Kaiser, Kwok Ching Tsui, Jiming Liu
ICIP
2007
IEEE
15 years 11 months ago
Robust Hash for Detecting and Localizing Image Tampering
An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations (like image tampering) and distinct queries. Although existing methods try to...
Sujoy Roy, Qibin Sun
ICDAR
2011
IEEE
13 years 9 months ago
Symbol Spotting in Line Drawings through Graph Paths Hashing
—In this paper we propose a symbol spotting technique through hashing the shape descriptors of graph paths (Hamiltonian paths). Complex graphical structures in line drawings can ...
Anjan Dutta, Josep Lladós, Umapada Pal
IEEEIAS
2009
IEEE
15 years 4 months ago
One-way Hash Function Construction Based on Conservative Chaotic Systems
: An algorithm for one-way hash function construction based on conservative chaotic system is proposed. The plaintext is divided into a group of message blocks by a fixed length an...
Qing-hua Zhang, Han Zhang, Zhao-hui Li
BC
2004
98views more  BC 2004»
14 years 9 months ago
A stochastic model for the detection of coherent motion
A computational model is presented for the detection of coherent motion based on template matching and hidden Markov models. The premise of this approach is that the growth in dete...
Jason Lee, Willy Wong