Filters








4,008 Hits in 6.6 sec

Page 6315 of Mathematical Reviews Vol. , Issue 93k [page]

1993 Mathematical Reviews  
The paper studies ways of implementing the hashing scheme known from serial computation as “open addressing” on the concurrent- read concurrent-write parallel random access machine (a shared memory machine  ...  “The final two contributions deal with the extension of logic programming towards object oriented programming.  ... 

A Study of User-Friendly Hash Comparison Schemes

Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang
2009 2009 Annual Computer Security Applications Conference  
This is the first work to perform a comparative study of these hash comparison schemes to determine which scheme allows the fastest and most accurate comparison.  ...  To evaluate the schemes, we performed an online user study with more than 400 participants.  ...  Online Study We performed an online user study to compare the accuracy and time needed for each of the hash comparison schemes.  ... 
doi:10.1109/acsac.2009.20 dblp:conf/acsac/HsiaoLSSWKPSY09 fatcat:wbal6vxfcvhifno5ox5uh377vq

Load Thresholds for Cuckoo Hashing with Overlapping Blocks

Stefan Walzer, Michael Wagner
2018 International Colloquium on Automata, Languages and Programming  
ACM Subject Classification Theory of computation → Data structures design and analysis, Mathematics of computing → Probabilistic algorithms, Theory of computation → Bloom filters and hashing  ...  If such an orientation exists, H is orientable. We now restate the hashing schemes from the introduction in this hypergraph framework, switching to letters e (and E) to refer to (sets of) edges.  ...  Constructing orientations We examine the LSA algorithm by Khosla for insertion of elements, adapted to our hashing scheme.  ... 
doi:10.4230/lipics.icalp.2018.102 dblp:conf/icalp/Walzer18 fatcat:vku6ytbxpne43podtjnkyj7e5i

A Holistic Framework for Addressing the World Using Machine Learning

Ilke Demir, Forest Hughes, Aman Raj, Kaunil Dhruv, Suryanarayana Murthy Muddala, Sanyam Garg, Barrett Doo, Ramesh Raskar
2018 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)  
Our addressing scheme is coherent with the street topology, linear and hierarchical to follow human perception, and universal to be used as a unified geocoding system.  ...  Millions of people are disconnected from basic services due to lack of adequate addressing. We propose an automatic generative algorithm to create street addresses from satellite imagery.  ...  We use two levels of hashing, into 1km x 1km cell of three letters, and into 30m x 30m address cells represented by five letters -first level hash (3), second level hash (1) and the direction.  ... 
doi:10.1109/cvprw.2018.00245 dblp:conf/cvpr/Demir18 fatcat:zzg2veb5v5hdfktbbtais2jm3e

Archival and retrieval of symbolic images: An invariant scheme based on triangular spatial relationship

D.S. Guru, P. Punitha, P. Nagabhushan
2003 Pattern Recognition Letters  
The scheme preserves TSR among the components in a symbolic image by the use of quadruples. A SID is created through the construction of B-tree, an efficient multilevel indexing structure.  ...  The study made in this work reveals that the model bears various advantages when compared to other existing models and could be extended towards dynamic databases.  ...  Though the hash-oriented approaches are efficient from the point of view of retrieval time, construction of hash table takes exponential time complexity.  ... 
doi:10.1016/s0167-8655(03)00069-2 fatcat:76rejmcfkjegrkqxqky7djpm3m

Generative Street Addresses from Satellite Imagery

İlke Demir, Forest Hughes, Aman Raj, Kaunil Dhruv, Suryanarayana Muddala, Sanyam Garg, Barrett Doo, Ramesh Raskar
2018 ISPRS International Journal of Geo-Information  
Currently, 75% of the world's roads lack adequate street addressing systems.  ...  However, settlements are identified by streets, and such addressing schemes are not coherent with the road topology.  ...  We would like to thank Harshita Shrivastva, Richi Raut, and Jatin Malhotra for the data collection. We would also  ... 
doi:10.3390/ijgi7030084 fatcat:y4azvhlkbjaotgnfw7zexkyike

Load Thresholds for Cuckoo Hashing with Overlapping Blocks [article]

Stefan Walzer
2019 arXiv   pre-print
Experiments suggested that this scheme outperforms the variant with blocks in which intervals are aligned at multiples of ℓ.  ...  Dietzfelbinger and Weidling [DW07] proposed a natural variation of cuckoo hashing where each of cn objects is assigned k = 2 intervals of size ℓ in a linear (or cyclic) hash table of size n and both start  ...  If such an orientation exists, H is orientable. We now restate the hashing schemes from the introduction in this hypergraph framework, switching to letters e (and E) to refer to (sets of) edges.  ... 
arXiv:1707.06855v3 fatcat:7gxt2srj6zbkvicj4kketnugem

An Empirical Study of Textual Key-Fingerprint Representations

Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, Matthew Smith
2016 USENIX Security Symposium  
With the introduction of end-to-end security in WhatsApp and other messengers, the discussion on how to best represent key-fingerprints for users is receiving a lot of interest.  ...  We conduct a 1047 participant study evaluating six different textual key-fingerprint representations with regards to their performance and usability.  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their insightful comments, and Trevor Perrin, Jake McGinty, Tom Ritter and Skylar Nagao for their discussion and excellent feedback  ... 
dblp:conf/uss/DechandSBAF016 fatcat:ih2wmooth5dnvkqn77qqktkvhm

Perfect hashing

Zbigniew J. Czech, George Havas, Bohdan S. Majewski
1997 Theoretical Computer Science  
for letter-oriented keys.  ...  Inspired by method of Chang et al. [23], Chang proposed a composite perfect hashing scheme for large letter-oriented key sets [21] with the help of a hashing indicator directory (HID).  ...  The rest of the symbols we use may have different meanings depending on the chapter in which the symbols occur.  ... 
doi:10.1016/s0304-3975(96)00146-6 fatcat:htaph24frffzjevl2q6kxz467e

Free-Form Deformation Axis Aligned Bounding Box [chapter]

Sunhwa Jung, Min Hong, Min-Hyung Choi
2009 Lecture Notes in Computer Science  
However, the lack of effective collision detection and resolution schemes for an FFD-embedded surface hinders the overall performance and often becomes a bottleneck.  ...  On the other hand, applying collision detection and resolution techniques directly to the embedded surface is extremely expensive and can obliterate the viability of real-time FFD simulation because the  ...  For optimal performance of spatial hashing, the size of the spatial hashing cell should be close to the largest length of the edges in optimal hashing.  ... 
doi:10.1007/978-3-642-02617-1_82 fatcat:elikn3u6fjabbag7ybzxeql4wm

DVHN: A Deep Hashing Framework for Large-scale Vehicle Re-identification [article]

Yongbiao Chen, Sheng Zhang, Fangxin Liu, Chenggang Wu, Kaicheng Guo, Zhengwei Qi
2021 arXiv   pre-print
Extensive experiments on two widely-studied vehicle re-identification datasets- VehicleID and VeRi- have demonstrated the superiority of our method against the state-of-the-art deep hash methods.  ...  In this paper, we make the very first attempt to investigate the integration of deep hash learning with vehicle re-identification.  ...  Second, we conduct a detailed ablation study to demonstrate the effectiveness of each component of our proposed DVHN.  ... 
arXiv:2112.04937v1 fatcat:b5cawzrbavcn5m5mjefvyzq4lm

Semi-Supervised Nonlinear Hashing Using Bootstrap Sequential Projection Learning

Chenxia Wu, Jianke Zhu, Deng Cai, Chun Chen, Jiajun Bu
2013 IEEE Transactions on Knowledge and Data Engineering  
In this paper, we study the effective semi-supervised hashing method under the framework of regularized learningbased hashing.  ...  Thus, the dimensionality of the matrix for computation is not only independent from the dimensionality of the original data space but also much smaller than the one using linear hash function.  ...  ACKNOWLEDGMENTS The authors appreciate the reviewers for their extensive and informative comments for the improvement of this manuscript. The authors would like to thank Mr.  ... 
doi:10.1109/tkde.2012.76 fatcat:e5rm2ymkpjdxzp6rvj2bzyuqwi

Reconfigurable and High-efficiency Password Recovery Algorithms Based on HRCA

Bin Li, Feng Feng, Xiaojie Chen, Yan Cao
2021 IEEE Access  
the hash algorithm to match the application with the appropriate structure.  ...  Second, combined with the pipeline technology, the full pipeline hash and highspeed password attack algorithms are optimized and implemented to meet the needs of high-performance computing.  ...  Therefore, the reconfigurable schemes of the hash algorithm are also limited.  ... 
doi:10.1109/access.2021.3053068 fatcat:4352zqo6bfaotfpcmaoyvnooki

A survey on new approaches in SignCryption
English

2015 International Journal of Research and Applications  
The first signcryption scheme was introduced by Zheng (1997) but it fails the forward secrecy of message confidentiality and verifying of a signature not in publicly [2].  ...  In this scheme, we make sure the security feature of forward secrecy to the signcryption, without an increase in computational cost.  ...  We will sometimes want a single letter to refer to one of the keys. The letter p won't do. We will use the letter e to refer to the public key, since the public key is used when encrypting a message.  ... 
doi:10.17812/ijra.2.6(48)2015 fatcat:i2vsibjpo5hbxnpg4gjorwynlq

Symmetric Cryptography [chapter]

2006 Security in Fixed and Wireless Networks  
Identification protocols allow to securely verify the identity of the party at the other end of the line.  ...  Cryptographic algorithms are the equivalent of locks, seals, security stamps and identification documents on the Internet.  ...  Design and provable security, for -signature schemes -public-key encryption schemes -identity-based encryption schemes -key agreement protocols -group-oriented protocols 2.  ... 
doi:10.1002/0470863722.ch3 fatcat:kye7h3pmnbhkjksvyr4tj4nj7e
« Previous Showing results 1 — 15 out of 4,008 results