Sciweavers

268 search results - page 12 / 54
» An Analysis of Bitstate Hashing
Sort
View
FSE
2010
Springer
147views Cryptology» more  FSE 2010»
14 years 20 days ago
Security Analysis of the Mode of JH Hash Function
Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nan...
CISC
2008
Springer
100views Cryptology» more  CISC 2008»
13 years 9 months ago
Security Analysis of Multivariate Polynomials for Hashing
Luk Bettale, Jean-Charles Faugère, Ludovic ...
JISE
2008
64views more  JISE 2008»
13 years 7 months ago
Analysis of All-or-Nothing Hash Functions
Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu
PR
2006
100views more  PR 2006»
13 years 7 months ago
An analysis of BioHashing and its variants
Adams Wai-Kin Kong, King Hong Cheung, David Zhang,...
ECCV
2010
Springer
14 years 1 months ago
Fast Approximate Nearest Neighbor Methods for Non-Euclidean Manifolds with Applications to Human Activity Analysis in Videos
Approximate Nearest Neighbor (ANN) methods such as Locality Sensitive Hashing, Semantic Hashing, and Spectral Hashing, provide computationally ecient procedures for nding objects...
Rizwan Chaudhry, Yuri Ivanov