Sciweavers

4438 search results - page 55 / 888
» On the Distribution of Keys by Hashing
Sort
View
STOC
2002
ACM
177views Algorithms» more  STOC 2002»
16 years 4 days ago
Similarity estimation techniques from rounding algorithms
A locality sensitive hashing scheme is a distribution on a family F of hash functions operating on a collection of objects, such that for two objects x, y, PrhF [h(x) = h(y)] = si...
Moses Charikar
FOCS
2007
IEEE
15 years 6 months ago
Strongly History-Independent Hashing with Applications
We present a strongly history independent (SHI) hash table that supports search in O(1) worst-case time, and insert and delete in O(1) expected time using O(n) data space. This ma...
Guy E. Blelloch, Daniel Golovin
ATAL
2010
Springer
15 years 29 days ago
Decentralized hash tables for mobile robot teams solving intra-logistics tasks
Although a remarkably high degree of automation has been reached in production and intra-logistics nowadays, human labor is still used for transportation using handcarts and forkl...
D. Sun, A. Kleiner, Christian Schindelhauer
ASIACRYPT
1999
Springer
15 years 4 months ago
Equivalent Keys of HPC
This paper presents a weakness in the key schedule of the AES candidate HPC (Hasty Pudding Cipher). It is shown that for the HPC version with a 128-bit key, 1 in 256 keys is weak i...
Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincen...
ICPR
2010
IEEE
14 years 9 months ago
Beyond "Near Duplicates": Learning Hash Codes for Efficient Similar-Image Retrieval
Finding similar images in a large database is an important, but often computationally expensive, task. In this paper, we present a two-tier similar-image retrieval system with the...
Shumeet Baluja, Michele Covell