Sciweavers

122 search results - page 16 / 25
» Reducing the Storage Requirements of a Perfect Hash Function
Sort
View
VLDB
2004
ACM
105views Database» more  VLDB 2004»
14 years 22 days ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
13 years 11 months ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang
ICIP
2005
IEEE
14 years 9 months ago
Approximation power of directionlets
In spite of the success of the standard wavelet transform (WT) in image processing, the efficiency of its representation is limited by the spatial isotropy of its basis functions ...
Vladan Velisavljevic, Baltasar Beferull-Lozano, Ma...
IEEEARES
2008
IEEE
14 years 1 months ago
Design of an FDB based Intra-domain Packet Traceback System
In this paper, we propose an FDB based intra-Domain Traceback System (FDB-DTS), which is a hybrid traceback system composed of packet digesting boxes and an iterative query engine...
Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadob...
CIKM
2008
Springer
13 years 9 months ago
Modeling LSH for performance tuning
Although Locality-Sensitive Hashing (LSH) is a promising approach to similarity search in high-dimensional spaces, it has not been considered practical partly because its search q...
Wei Dong, Zhe Wang, William Josephson, Moses Chari...