Sciweavers

268 search results - page 15 / 54
» An Analysis of Bitstate Hashing
Sort
View
FSE
2010
Springer
140views Cryptology» more  FSE 2010»
14 years 20 days ago
Cryptanalysis of ESSENCE
ESSENCE is a hash function submitted to the NIST Hash Competition that stands out as a hardware-friendly and highly parallelizable design. Previous analysis showed some non-randomn...
María Naya-Plasencia, Andrea Röck, Jea...
SIGCOMM
2012
ACM
11 years 10 months ago
Spinal codes
A fundamental problem in wireless networks is to develop communication protocols that achieve high throughput in the face of noise, interference, and fading, all of which vary wit...
Jonathan Perry, Peter Iannucci, Kermin Fleming, Ha...
CISIS
2009
IEEE
14 years 2 months ago
Integration of Shareable Containers with Distributed Hash Tables for Storage of Structured and Dynamic Data
Structured, spatial-temporal data arises in many applications areas such as transportation, sensor networks or mobile services. Peer to peer networks are the natural choice for th...
eva Kühn, Richard Mordinyi, Hannu-D. Goiss, T...
ICDAR
2009
IEEE
13 years 5 months ago
Shape Descriptor Based Document Image Indexing and Symbol Recognition
In this paper we present a novel shape descriptor based on shape context, which in combination with hierarchical distance based hashing is used for word and graphical pattern base...
Ehtesham Hassan, Santanu Chaudhury, M. Gopal
SAC
2008
ACM
13 years 7 months ago
Digital audio watermarking evaluation within the application field of perceptual hashing
Digital watermarking is a growing research area to mark digital content by embedding information into the content itself. Perceptual hashing is used to identify a specific content...
Andreas Lang, Jana Dittmann