Sciweavers

268 search results - page 45 / 54
» An Analysis of Bitstate Hashing
Sort
View
SIGIR
2010
ACM
14 years 1 months ago
Adaptive near-duplicate detection via similarity learning
In this paper, we present a novel near-duplicate document detection method that can easily be tuned for a particular domain. Our method represents each document as a real-valued s...
Hannaneh Hajishirzi, Wen-tau Yih, Aleksander Kolcz
ACSC
2004
IEEE
14 years 1 months ago
Code Improvements for Model Elimination Based Reasoning Systems
We have been investigating ways in which the performance of model elimination based systems can be improved and in this paper we present some of our results. Firstly, we have inve...
Richard A. Hagen, Scott D. Goodwin, Abdul Sattar
CSREASAM
2006
13 years 11 months ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
CMS
2003
148views Communications» more  CMS 2003»
13 years 11 months ago
Computation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable f...
Alwyn Goh, David Ngo Chek Ling
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
Oblivious RAM Revisited
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a client, that can store locally only a constant amount of data, to store remotely ...
Benny Pinkas, Tzachy Reinman