Sciweavers

713 search results - page 83 / 143
» Dispersing Hash Functions
Sort
View
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
15 years 3 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
CVPR
2008
IEEE
15 years 12 months ago
Fast image search for learned metrics
We introduce a method that enables scalable image search for learned metrics. Given pairwise similarity and dissimilarity constraints between some images, we learn a Mahalanobis d...
Prateek Jain, Brian Kulis, Kristen Grauman
ICIP
2006
IEEE
15 years 11 months ago
A Video Fingerprint Based on Visual Digest and Local Fingerprints
A fingerprinting design extracts discriminating features, called fingerprints. The extracted features are unique and specific to each image/video. The visual hash is usually a glo...
Ayoub Massoudi, Bertrand Chupeau, Claire-Hé...
SASO
2008
IEEE
15 years 4 months ago
Using Global Information for Load Balancing in DHTs
Distributed Hash Tables (DHT) with order-preserving hash functions require load balancing to ensure an even item-load over all nodes. While previous item-balancing algorithms only...
Mikael Högqvist, Seif Haridi, Nico Kruber, Al...
JNW
2006
120views more  JNW 2006»
14 years 9 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani