Sciweavers

268 search results - page 29 / 54
» An Analysis of Bitstate Hashing
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
Performance Analysis of Stealth DHT with Mobile Nodes
The advances in wireless networking and the consequent emergence of new applications that wireless networks increasingly support inevitably leads to low capability mobile nodes co...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, La...
IWPSE
2007
IEEE
14 years 3 months ago
Structural analysis and visualization of C++ code evolution using syntax trees
We present a method to detect and visualize evolution patterns in C++ source code. Our method consists of three steps. First, we extract an annotated syntax tree (AST) from each v...
Fanny Chevalier, David Auber, Alexandru Telea
JOC
2000
130views more  JOC 2000»
13 years 9 months ago
A Detailed Analysis of SAFER K
In this paper we analyze the block cipher SAFER K. First, we show a weakness in the key schedule, that has the effect that for almost every key there exists on the average three an...
Lars R. Knudsen
GLOBECOM
2010
IEEE
13 years 7 months ago
Analysis of Messaging Load in a P2PP Overlay Network under Churn
We analyze the performance of a DHT-based P2P overlay network in resource access and overlay maintenance activities. We use a cross-platform implementation of the protocol called P...
Otso Kassinen, Erkki Harjula, Mika Ylianttila
CIVR
2007
Springer
273views Image Analysis» more  CIVR 2007»
14 years 3 months ago
Scalable near identical image and shot detection
This paper proposes and compares two novel schemes for near duplicate image and video-shot detection. The first approach is based on global hierarchical colour histograms, using ...
Ondrej Chum, James Philbin, Michael Isard, Andrew ...