Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
LSH
biblio
Privacy-Preserving Fuzzy Multi-Keyword Search for Multiple Data Owners in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 11:02am
locality-sensitive hashing
Computing Theory and Privacy
single data owner model
searchable encryption schemes
search privacy
privacy-preserving fuzzy multikeyword search
plaintext search techniques
multiple data owners
LSH
Information Leakage
fuzzy multi-keyword search.
encrypted documents
ciphertext search
Bloom filter
BF
Cloud Computing
Privacy-preserving
encryption method
cloud server
Indexes
fuzzy set theory
query processing
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Cryptography
Servers
Scalability
biblio
Enhancing Sampling and Counting Method for Audio Retrieval with Time-Stretch Resistance
Submitted by grigby1 on Mon, 01/21/2019 - 11:27am
LSH
turning point alignment method
Turning
time-stretch resistance
time-stretch
state-of-the-art methods
state-of-the-art audio retrieval method
Sampling and Counting Method
retrieval performance
Resists
Resistance
Resiliency
pubcrawl
Philips-like fingerprints
noise distortions
massive audio dataset
Acoustic Fingerprints
information retrieval
Indexes
ideal audio retrieval method
Human behavior
Fingerprint recognition
fingerprint matching
Filtering
distortion
composability
audio track
audio signal processing
audio retrieval
audio fingerprint
Acoustic signal processing
biblio
Scalable Local-Recoding Anonymization Using Locality Sensitive Hashing for Big Data Privacy Preservation
Submitted by grigby1 on Mon, 04/24/2017 - 10:41am
Human behavior
Security Metrics
Resiliency
pubcrawl
privacy preservation
Metrics
MapReduce
LSH
in the cloud
Big Data
hash algorithms
Computing Theory
composability
cloud
big data securityComputing Theory
big data security
big data privacy
biblio
Density Sensitive Hashing
Submitted by BrandonB on Wed, 05/06/2015 - 11:04am
locality sensitive hashing
Vectors
search problems
random projection
Quantization (signal)
projective function
principal component analysis
Nearest neighbor searches
LSH
Binary codes
high dimensional nearest neighbor search
geometric structure
file organisation
Entropy
DSH
density sensitive hashing
Databases
clustering
biblio
Towards a Data Semantics Management System for Internet Traffic
Submitted by BrandonB on Wed, 05/06/2015 - 10:53am
Internet traffic data semantic learning
traffic data semantics
telecommunication traffic
storage management
Semantics
Protocols
ontologies (artificial intelligence)
networking semantics
LSH
locality sensitive hashing algorithm
learning behavior
learning (artificial intelligence)
latent Dirichlet allocation algorithm
Algorithm design and analysis
internet
feature extraction
dynamic ontology
DSMS
data semantics management system
data reduction
Data models
Data mining
data dimensionality reduction
cognition
cloud-like data storage technique