Sciweavers

1538 search results - page 143 / 308
» Relative Randomness and Cardinality
Sort
View
ESA
2009
Springer
149views Algorithms» more  ESA 2009»
15 years 4 months ago
3.5-Way Cuckoo Hashing for the Price of 2-and-a-Bit
The study of hashing is closely related to the analysis of balls and bins; items are hashed to memory locations much as balls are thrown into bins. In particular, Azar et. al. [2] ...
Eric Lehman, Rina Panigrahy
ACISP
2007
Springer
15 years 4 months ago
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest assumption on the manual channel (i.e. assuming the st...
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh...
WAOA
2007
Springer
158views Algorithms» more  WAOA 2007»
15 years 4 months ago
Deterministic Algorithms for Rank Aggregation and Other Ranking and Clustering Problems
We consider ranking and clustering problems related to the aggregation of inconsistent information. Ailon, Charikar, and Newman [1] proposed randomized constant factor approximatio...
Anke van Zuylen, David P. Williamson
CVPR
2010
IEEE
15 years 3 months ago
YouTubeCat: Learning to Categorize Wild Web Videos
Automatic categorization of videos in a Web-scale unconstrained collection such as YouTube is a challenging task. A key issue is how to build an effective training set in the pres...
Zheshen Wang, Ming Zhao, Yang Song, Sanjiv Kumar, ...
ISPAN
2005
IEEE
15 years 3 months ago
Overlay networks with class
We define a family of Distributed Hash Table systems whose aim is to combine routing efficiency of the randomized networks — i.e. average path length O(log n/ log log n) vs. t...
Giovanni Chiola, Gennaro Cordasco, Luisa Gargano, ...