436 Hits in 6.7 sec

A new parallel signature file method for efficient information retrieval

Jeong-Ki Kim, Jae-Woo Chang
1995 Proceedings of the fourth international conference on Information and knowledge management - CIKM '95  
The signature file method has been widely advocated as an efficient index scheme to handle new abdications demand-  ...  In section 3, we propose a new dynamic signature file method, called HPSF, using extendible hashing and frame-slicing techniques.  ...  Therefore, in this paper we propose a horizontally-divided parallel signature file (HPSF) method using extendible hashing and frame-slicing techniques.  ... 
doi:10.1145/221270.221329 dblp:conf/cikm/KimC95 fatcat:zdr7lpwq7nf5zmodzkpsxgkuji

Hierarchical Indexing Structure for Efficient Similarity Search in Video Retrieval

Hong Lu, Beng Chin Ooi, Heng Tao Shen, Xiangyang Xue
2006 IEEE Transactions on Knowledge and Data Engineering  
OVA-File is a hierarchical structure and has two novel features: 1) partitioning the whole file into slices such that only a small number of slices are accessed and checked during k Nearest Neighbor (kNN  ...  Extensive experimental studies using real video data sets were conducted and the results showed that our methods can yield a significant speed-up over an existing VA-file-based method and iDistance with  ...  and 045115020, and the Open Research Foundation of the Shanghai Key Laboratory of Intelligent Information Processing.  ... 
doi:10.1109/tkde.2006.174 fatcat:itnukurksbaldpgwykfrfchu3m

An Indexing and Retrieval Mechanism for Complex Similarity Queries in Image Databases

Guang-Ho Cha, Chin-Wan Chung
1999 Journal of Visual Communication and Image Representation  
In addition to the HG-tree, the signature file and hashing technique are also employed to index keywords and semantic features.  ...  The proposed indexing scheme combines and extends the HG-tree, the signature file and the hashing scheme to support complex similarity queries.  ...  To attack these performance disadvantages of existing dynamic signature files, we combine the concepts of the HG-tree and the frame-sliced signature file [26] .  ... 
doi:10.1006/jvci.1999.0410 fatcat:kg4p74nuxvg7diezg5jynizns4

A Comprehensive Analysis On Efficient Multimedia Storage Mechanism In Public Cloud Environment With Secured Access

G. Megala, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
In this paper, an ample analysis is presented on file storage encompassing fragmentation, compression, encryption security concerns in cloud storage and access.  ...  Dynamic on-demand service has become the crucial part in cloud computing according to the user's requirements.  ...  Bloom filter data structure stores the sensitive fragment securely using hash function in a dynamic hashing scheme and performs mapping for retrieval access by user.  ... 
doi:10.17762/turcomat.v12i5.1794 fatcat:v37hz23khbhzlnz7tccy2sfsly

Rate-Distortion-Authentication Optimized Streaming of Authenticated Video

Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John Apostolopoulos, Susie Wee
2007 IEEE transactions on circuits and systems for video technology (Print)  
Generic data stream authentication methods usually impose overhead and dependency among packets for verification.  ...  techniques and data stream authentication techniques.  ...  Li (Stanford University) and K. Suehring (Fraunhofer Institute) for their help with the H.264 JM software.  ... 
doi:10.1109/tcsvt.2006.888822 fatcat:n6druao5mreg7c4vdgc73ffoou

Data Integrity of Radiology Images Over an Insecure Network Using AES Technique

Pavithra Prabhu, Manjunath K N, Chitra Rajarama, Anjali Kulkarni, Rajendra Kurady
2021 Asian Pacific Journal of Cancer Prevention  
The results were validated statistically using mean square error and histogram matching techniques.  ...  Methods: In this paper a hybrid cryptographic technique which combines the prime details from the patient dataset (stack of axial 2D images) and the Advanced Encryption Standard (AES) method has been proposed  ...  the proposed technique, we can apply the digital signature or hashing for non-image DICOM objects also.  ... 
doi:10.31557/apjcp.2021.22.1.185 fatcat:l6vumqikezhixlhlz4saa7nn4i

Parallel computing in information retrieval – an updated review

A. Macfarlane, S.E. Robertson, J.A. Mccann
1997 Journal of Documentation  
We analyse parallel IR systems using a classification due to Rasmussen [1] and describe some parallel IR systems.  ...  The DAP is successfully used by the DapText system described by Reddaway [11] and is included in the case studies section (7.1) below. Reuters use this system for their Text Retrieval purposes.  ...  We are also grateful to the two anonymous referees who gave us valuable comments on an earlier draft of this paper, improving it considerably.  ... 
doi:10.1108/eum0000000007201 fatcat:2zuwtehixbd6xk33hwb3j43nse

Recognition of Activities of Daily Living Based on Environmental Analyses Using Audio Fingerprinting Techniques: A Systematic Review

Ivan Pires, Rui Santos, Nuno Pombo, Nuno Garcia, Francisco Flórez-Revuelta, Susanna Spinsante, Rossitza Goleva, Eftim Zdravevski
2018 Sensors  
This paper reviews audio fingerprinting techniques that can be used with the acoustic data acquired from mobile devices.  ...  between 2002 and 2017.  ...  The authors would also like to acknowledge the contribution of the COST Action IC1303-AAPELE-Architectures, Algorithms and Protocols for Enhanced Living Environments.  ... 
doi:10.3390/s18010160 pmid:29315232 pmcid:PMC5795595 fatcat:52ebtpevzjfdtbcehfkcw26xby

Character index

2011 2011 IEEE International Conference on Multimedia and Expo  
doi:10.1109/icme.2011.6011827 fatcat:wjy7yvkmvbbf3hj4wbyjapx5gu

Matching Subsequence Music Retrieval in a Software Integration Environment

Zhencong Li, Qin Yao, Wanzhi Ma, Zhihan Lv
2021 Complexity  
algorithm by using the features of music.  ...  , this paper proposes vector fusion by dimensionality reduction of GFCC features and rhythm features.  ...  To solve this problem, the method of overlapping split I post is often used, i.e., allowing a certain overlap between the previous frame and the next frame.  ... 
doi:10.1155/2021/4300059 fatcat:rcefqi7v7bduthpwfneyquo3kq

Site2Vec: a reference frame invariant algorithm for vector embedding of protein-ligand binding sites [article]

Arnab Bhadra, Kalidas Y
2020 arXiv   pre-print
The vector embedding serves as a locality sensitive hash function for proximity queries and determining similar sites.  ...  The method has been the top performer with more than 95 extensive benchmarking studies carried over 10 datasets and against 23 other site comparison methods.  ...  These two comparison techniques are used in the sensitivity analysis of this method.  ... 
arXiv:2003.08149v2 fatcat:7265cfnvdneo5eyz3cxdrgfcda

Dynamic slicing on Java bytecode traces

Tao Wang, Abhik Roychoudhury
2008 ACM Transactions on Programming Languages and Systems  
Dynamic slicing is a well-known technique for program analysis, debugging and understanding.  ...  Thus, dynamic slicing forms the core of many tasks in program development and it is useful to develop efficient methods for computing dynamic slices.  ...  Slicing techniques are divided into two categories: static and dynamic.  ... 
doi:10.1145/1330017.1330021 fatcat:omzoc3dicnc3he5bn3yugu72uu

Structured P2P technologies for distributed command and control

Daniel R. Karrels, Gilbert L. Peterson, Barry E. Mullins
2009 Peer-to-Peer Networking and Applications  
The utility of Peer-to-Peer (P2P) systems extends far beyond traditional file sharing.  ...  It concludes with a presentation of design tradeoffs and opportunities for future research into P2P overlay systems.  ...  Consistent hashing in Chord uses a standard hashing technique (such as SHA-1 [65] ) to create two hash values for a node.  ... 
doi:10.1007/s12083-009-0033-y fatcat:ax5ihdfzfrhqjjqjvcqz266ome

A Survey on Adversarial Attacks for Malware Analysis [article]

Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam
2022 arXiv   pre-print
The paper will introduce various machine learning techniques used to generate adversarial and explain the structure of target files.  ...  Work will provide a taxonomy of adversarial evasion attacks on the basis of attack domain and adversarial generation techniques.  ...  Authors collected large categories of features from open source malware detectors namely: hash-based signatures, rule-based signatures and data distribution based features.  ... 
arXiv:2111.08223v2 fatcat:fiw3pgunsvb2vo7uv72mp6b65a

Rapid phylogenetic and functional classification of short genomic fragments with signature peptides

Joel Berendzen, William J Bruno, Judith D Cohn, Nicolas W Hengartner, Cheryl R Kuske, Benjamin H McMahon, Murray A Wolinsky, Gary Xie
2012 BMC Research Notes  
Conclusions: Classification by exact matching against a precomputed list of signature peptides provides comparable results to existing techniques for reads longer than about 300 bp and does not degrade  ...  analysis package using BLASTX against the NR database.  ...  ; Susannah Tringe at the DOE Joint Genome Institute, Walnut Creek, for technical help with sequencing; Cliff Han for the draft soil genomes used in Figure 6  ... 
doi:10.1186/1756-0500-5-460 pmid:22925230 pmcid:PMC3772700 fatcat:w5gp7htz7zcmtj3yshecvpuuqq
« Previous Showing results 1 — 15 out of 436 results