Sciweavers

1080 search results - page 38 / 216
» Distributed Hash Tables
Sort
View
109
Voted
ICASSP
2009
IEEE
15 years 9 months ago
DCT based multiple hashing technique for robust audio fingerprinting
Audio fingerprinting techniques should successfully perform content-based audio identification even when the audio files are slightly or seriously distorted. In this paper, we ...
Yu Liu, Kiho Cho, Hwan Sik Yun, Jong Won Shin, Nam...
119
Voted
DCC
2010
IEEE
15 years 9 months ago
gFPC: A Self-Tuning Compression Algorithm
This paper presents and evaluates gFPC, a self-tuning implementation of the FPC compression algorithm for double-precision floating-point data. gFPC uses a genetic algorithm to re...
Martin Burtscher, Paruj Ratanaworabhan
FPL
2004
Springer
117views Hardware» more  FPL 2004»
15 years 8 months ago
Flow Monitoring in High-Speed Networks with 2D Hash Tables
Abstract. Flow monitoring is a required task for a variety of networking applications including fair scheduling and intrusion/anomaly detection. Existing flow monitoring techniques...
David Nguyen, Joseph Zambreno, Gokhan Memik
139
Voted
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
15 years 8 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal
124
Voted
ISLPED
2006
ACM
73views Hardware» more  ISLPED 2006»
15 years 8 months ago
Substituting associative load queue with simple hash tables in out-of-order microprocessors
Buffering more in-flight instructions in an out-of-order microprocessor is a straightforward and effective method to help tolerate the long latencies generally associated with ...
Alok Garg, Fernando Castro, Michael C. Huang, Dani...