Sciweavers

648 search results - page 10 / 130
» Authenticated hash tables
Sort
View
ESA
2008
Springer
129views Algorithms» more  ESA 2008»
13 years 10 months ago
More Robust Hashing: Cuckoo Hashing with a Stash
Cuckoo hashing holds great potential as a high-performance hashing scheme for real applications. Up to this point, the greatest drawback of cuckoo hashing appears to be that there...
Adam Kirsch, Michael Mitzenmacher, Udi Wieder
ICASSP
2009
IEEE
14 years 3 months ago
DCT based multiple hashing technique for robust audio fingerprinting
Audio fingerprinting techniques should successfully perform content-based audio identification even when the audio files are slightly or seriously distorted. In this paper, we ...
Yu Liu, Kiho Cho, Hwan Sik Yun, Jong Won Shin, Nam...
ICIP
2008
IEEE
14 years 10 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
PPOPP
2012
ACM
12 years 4 months ago
CPHASH: a cache-partitioned hash table
CPHASH is a concurrent hash table for multicore processors. CPHASH partitions its table across the caches of cores and uses message passing to transfer lookups/inserts to a partit...
Zviad Metreveli, Nickolai Zeldovich, M. Frans Kaas...
DCC
2010
IEEE
14 years 3 months ago
gFPC: A Self-Tuning Compression Algorithm
This paper presents and evaluates gFPC, a self-tuning implementation of the FPC compression algorithm for double-precision floating-point data. gFPC uses a genetic algorithm to re...
Martin Burtscher, Paruj Ratanaworabhan