Sciweavers

1262 search results - page 60 / 253
» Fast Robust Hashing
Sort
View
85
Voted
FAST
2003
15 years 2 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
72
Voted
ICIP
2005
IEEE
16 years 2 months ago
Bounding box splitting for robust shape classification
This paper presents a fast method to compute homeomorphisms between 2D lattices and shapes found in binary images. Unlike many other methods, this mapping is not restricted to sim...
Christian Bauckhage, John K. Tsotsos
CVPR
2007
IEEE
16 years 2 months ago
Saliency Detection: A Spectral Residual Approach
The ability of human visual system to detect visual saliency is extraordinarily fast and reliable. However, computational modeling of this basic intelligent behavior still remains...
Xiaodi Hou, Liqing Zhang
77
Voted
WDAG
2007
Springer
102views Algorithms» more  WDAG 2007»
15 years 6 months ago
A Denial-of-Service Resistant DHT
We consider the problem of designing scalable and robust information systems based on multiple servers that can survive even massive denial-of-service (DoS) attacks. More precisely...
Baruch Awerbuch, Christian Scheideler
96
Voted
SPAA
2006
ACM
15 years 6 months ago
Towards a scalable and robust DHT
The problem of scalable and robust distributed data storage has recently attracted a lot of attention. A common approach in the area of peer-to-peer systems has been to use a dist...
Baruch Awerbuch, Christian Scheideler