Sciweavers

59 search results - page 8 / 12
» Locality-sensitive hashing scheme based on p-stable distribu...
Sort
View
85
Voted
HCI
2009
14 years 9 months ago
AR City Representation System Based on Map Recognition Using Topological Information
This paper presents a system for overlaying 3D GIS data information such as 3D buildings onto a 2D physical urban map. We propose a map recognition framework by analysis of distrib...
Hideaki Uchiyama, Hideo Saito, Myriam Servieres, G...
ASIACRYPT
2000
Springer
15 years 4 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
96
Voted
ICPP
2005
IEEE
15 years 5 months ago
Ferry: An Architecture for Content-Based Publish/Subscribe Services on P2P Networks
Leveraging DHTs (distributed hash table), we propose Ferry, an architecture for content-based publish/subscribe services. With its novel design in subscription installation, subsc...
Yingwu Zhu, Yiming Hu
103
Voted
OSDI
2004
ACM
15 years 12 months ago
Chain Replication for Supporting High Throughput and Availability
Chain replication is a new approach to coordinating clusters of fail-stop storage servers. The approach is intended for supporting large-scale storage services that exhibit high t...
Robbert van Renesse, Fred B. Schneider
EUROPAR
2007
Springer
15 years 5 months ago
Securing Sensor Reports in Wireless Sensor Networks*
Abstract. The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and ...
Al-Sakib Khan Pathan, Choong Seon Hong