Sciweavers

4438 search results - page 93 / 888
» On the Distribution of Keys by Hashing
Sort
View
IPTPS
2005
Springer
15 years 5 months ago
A Self-repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn
We present a dynamic distributed hash table where peers may join and leave at any time. Our system tolerates a powerful adversary which has complete visibility of the entire state ...
Fabian Kuhn, Stefan Schmid, Roger Wattenhofer
IPTPS
2004
Springer
15 years 5 months ago
When Multi-hop Peer-to-Peer Lookup Matters
Distributed hash tables have been around for a long time [5, 7]. A number of recent projects propose peerto-peer DHTs, based on multi-hop lookup optimizations. Some of these syste...
Rodrigo Rodrigues, Charles Blake
ACISP
2009
Springer
15 years 6 months ago
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
Abstract. Two of the most recent and powerful multi-property-preserving (MPP) hash domain extension transforms are the Ramdom-Oracle-XOR (ROX) transform and the Enveloped Shoup (ES...
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
ICASSP
2007
IEEE
15 years 6 months ago
Hash-Based Motion Modeling in Wyner-Ziv Video Coding
Generally, Distributed video coding (DVC) schemes perform motion estimation at the decoder side, without the current frame being available. In order to generate the side-informati...
Marco Tagliasacchi, Stefano Tubaro
98
Voted
COMPGEOM
2006
ACM
15 years 5 months ago
Lower bounds on locality sensitive hashing
Given a metric space (X, dX), c ≥ 1, r > 0, and p, q ∈ [0, 1], a distribution over mappings H : X → N is called a (r, cr, p, q)-sensitive hash family if any two points in...
Rajeev Motwani, Assaf Naor, Rina Panigrahy