Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
file organisation
biblio
Robust Hashing With Local Models for Approximate Similarity Search
Submitted by BrandonB on Wed, 05/06/2015 - 11:55am
robust hashing
Nickel
optimal hash code
query data point
query hash code
query processing
real-life datasets
RHLM
robust hash function learning
loss function
robust hashing-with-local models
Robustness
search efficiency
search quality
Training
Training data
training data points
training dataset
high-dimensional data
approximate similarity search
binary hash codes
computational complexity
database point
Databases
dimensionality curse
feature dimensionality
file organisation
1-norm minimization
high-dimensional data point mapping
indexing
l2
Laplace equations
Linear programming
local hashing model
local structural information
biblio
An FPGA implementation of high-throughput key-value store using Bloom filter
Submitted by BrandonB on Wed, 05/06/2015 - 11:52am
arrays
Bloom filter
cuckoo hashing algorithm
data structures
field programmable gate arrays
file organisation
FPGA
FPGA implementation
Hardware
hash tables
high-throughput key-value store
Information filters
Key-value Store
Random access memory
Software
biblio
An efficient parallel algorithm for hash computation in security and forensics applications
Submitted by BrandonB on Wed, 05/06/2015 - 11:47am
information security
standards
standard hash function
SHA-1 algorithm
SHA-1
Program processors
probability
parallel algorithms
parallel algorithm
OpenMP API
OpenMP
Multicore Processors
Multicore processing
MD5
Algorithm design and analysis
hashing algorithms
hash computation
file organisation
digital signatures
digital signature
Digital Forensics
data preservation
Cryptography
Cryptographic Hash Function
Conferences
collision probability
application program interfaces
biblio
An efficient parallel algorithm for hash computation in security and forensics applications
Submitted by BrandonB on Wed, 05/06/2015 - 11:02am
information security
standards
standard hash function
SHA-1 algorithm
SHA-1
Program processors
probability
parallel algorithms
parallel algorithm
OpenMP API
OpenMP
Multicore Processors
Multicore processing
MD5
Algorithm design and analysis
hashing algorithms
hash computation
file organisation
digital signatures
digital signature
Digital Forensics
data preservation
Cryptography
Cryptographic Hash Function
Conferences
collision probability
application program interfaces
biblio
A Group File Encryption Method using Dynamic System Environment Key
Submitted by BrandonB on Tue, 05/05/2015 - 8:38am
dynamic system environment key
system environment key
Servers
security level
security
message authentication
group file encryption
GEMS
file organisation
encryption
eavesdropping attack
auditing security scheme
DRM
decryption method
Cryptography
Computers
Cloud Computing
business data processing
autocrypt
authorization
authorisation
authentication
biblio
Secure distributed data structures for peer-to-peer-based social networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:22pm
online social network
trees (mathematics)
social networking (online)
Social network services
social enterprise network
secure distributed data structure
Public key
prefix trees
peer-to-peer technology
peer-to-peer networks
Peer-to-peer computing
Access Control
network security
global scale
file organisation
Distributed social networks
distributed list data structure
distributed hash table
distributed data management
data structures
authorisation
« first
‹ previous
1
2
3
4