Sciweavers

220 search results - page 19 / 44
» A Dynamic Pivot Selection Technique for Similarity Search
Sort
View
SACRYPT
2009
Springer
141views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
Cryptanalysis of Dynamic SHA(2)
In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash fun...
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan ...
ITCC
2003
IEEE
14 years 23 days ago
The Effects of Search Engines and Query Operators on Top Ranked Results
We examine whether the use of query operators changes the documents retrieved by three popular Web search engines. One hundred queries containing query operators were selected fro...
Bernard J. Jansen, Caroline M. Eastman
INFOCOM
2010
IEEE
13 years 6 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
WOWMOM
2006
ACM
108views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Multimedia Correlation Analysis in Unstructured Peer-to-Peer Networks
Recent years saw the rapid development of peer-topeer (P2P) networks in a great variety of applications. However, similarity-based k-nearest-neighbor retrieval (k-NN) is still a c...
Bo Yang, Ali R. Hurson, Yu Jiao, Thomas E. Potok
ICS
1993
Tsinghua U.
13 years 11 months ago
Dynamic Control of Performance Monitoring on Large Scale Parallel Systems
Performance monitoring of large scale parallel computers creates a dilemma: we need to collect detailed information to find performance bottlenecks, yet collecting all this data ...
Jeffrey K. Hollingsworth, Barton P. Miller