Sciweavers

59 search results - page 7 / 12
» Locality-sensitive hashing scheme based on p-stable distribu...
Sort
View
82
Voted
HPCA
2003
IEEE
16 years 1 days ago
Caches and Hash Trees for Efficient Memory Integrity
We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications s...
Blaise Gassend, G. Edward Suh, Dwaine E. Clarke, M...
ICCSA
2005
Springer
15 years 5 months ago
Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA
Abstract. Due to an increasing number of portable devices over 785million world Internet users, a support for quality of service (QoS) and security becomes a significant issue in ...
Kwang Chul Jeong, Hyunseung Choo, Sungchang Lee
ICIP
2004
IEEE
16 years 1 months ago
Robust perceptual image hashing via matrix invariants
In this paper we suggest viewing images (as well as attacks on them) as a sequence of linear operators and propose novel hashing algorithms employing transforms that are based on ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...
P2P
2005
IEEE
152views Communications» more  P2P 2005»
15 years 5 months ago
On Overlay Schemes to Support Point-in-Range Queries for Scalable Grid Resource Discovery
A resource directory is a critical component of a Grid architecture. P2P computing paradigm could address some of the scalability issues that make distributed resource discovery s...
Liping Chen, K. Selçuk Candan, Jun'ichi Tat...
139
Voted
VLDB
1999
ACM
118views Database» more  VLDB 1999»
15 years 3 months ago
Similarity Search in High Dimensions via Hashing
The nearest- or near-neighbor query problems arise in a large variety of database applications, usually in the context of similarity searching. Of late, there has been increasing ...
Aristides Gionis, Piotr Indyk, Rajeev Motwani