Printer Friendly

Browse Hashing (Computer programming) topic

Articles

1-19 out of 19 article(s)
Title Author Type Date Words
An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding. Du, Ling; He, Zehong; Wang, Yijing; Wang, Xiaochao; Ho, Anthony T.S. Report Sep 1, 2020 9100
Accelerating Binary String Comparisons with a Scalable, Streaming-Based System Architecture Based on FPGAs. Pilz, Sarah; Porrmann, Florian; Kaiser, Martin; Hagemeyer, Jens; Hogan, James M.; Ruckert, Ulrich Report Feb 1, 2020 9335
Deep Hashing for Semi-supervised Content Based Image Retrieval. Bashir, Muhammad Khawar; Saleem, Yasir Technical report Aug 1, 2018 6020
The Trouble with Tags: Seeking Mark Protection for Corporate Branded Hashtags - More Trouble Than It's Worth? Salter, Kendall Mar 22, 2018 7221
Image Hashing for Tamper Detection with Multiview Embedding and Perceptual Saliency. Du, Ling; Chen, Zhen; Ke, Yongzhen Report Jan 1, 2018 6405
Critical Analysis of Hash Based Signature Schemes. Gagnidze, A.; Iavich, M.; Inasaridze, N.; Iashvili, G.; Vyalkova, V. Report Jan 1, 2018 3150
A Novel DBSCAN Based on Binary Local Sensitive Hashing and Binary-KNN Representation. He, Qing; Gu, Hai Xia; Wei, Qin; Wang, Xu Report Jan 1, 2017 6095
An efficient complex event processing algorithm based on INFA-HTS for out-of-order RFID event streams. Wang, Jianhua; Wang, Tao; Cheng, Lianglun; Lu, Shilei Report Sep 1, 2016 8339
A Dynamic Linear Hashing Method for Redundancy Management in Train Ethernet Consist Network. Nie, Xiaobo; Wang, Lide; Wang, Baohua; Liu, Biao; Shen, Ping Report Jan 1, 2016 5966
A churn resilience technique on P2P sensor data stream delivery system using distributed hashing. Kawakami, Tomoya; Ishi, Yoshimasa; Yoshihisa, Tomoki; Teranishi, Yuuichi Report Dec 1, 2015 5184
Fast search with data-oriented multi-index hashing for multimedia data. Ma, Yanping; Zou, Hailin; Xie, Hongtao; Su, Qingtang Report Jul 1, 2015 6384
Content based image retrieval using perceptual hashing. Puviarasan, N.; Bhavani, R.; Aruna, P.; Sindhiya, M. Report Jun 1, 2015 2292
A cost effective and preventive approach to avoid integration faults caused by mistakes in distribution of software components. Chaves, Luciano Lucindo Report Jan 1, 2014 9097
Parallel processing of the fuzzy fingerprint vault based on geometric hashing. Chae, Seung-Hoon; Lim, Sung Jin; Bae, Sang-Hyun; Chung, Yongwha; Pan, Sung Bum Report Dec 1, 2010 6441
Defining moment. Piazza, Peter Brief Article Oct 1, 2005 127
Recursive hashing functions for n-grams. Cohen, Jonathan D. Jul 1, 1997 10676
Minimal space, average linear time duplicate deletion. Teuhola, Jukka; Wegner, Lutz tutorial Mar 1, 1991 5233
Fast hashing of variable-length text strings. Pearson, Peter K. technical Jun 1, 1990 2123
Concurrent operations on extendible hashing and its performance. Kumar, Vijay technical Jun 1, 1990 8787

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters