Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hash algorithms
biblio
A Local Integral Hash Nearest Neighbor Algorithm
Submitted by grigby1 on Fri, 05/22/2020 - 2:37pm
Metrics
trees (mathematics)
tree structure
tree data structures
tree based algorithms
search problems
pubcrawl
nearest neighbour methods
nearest neighbor search algorithm
nearest neighbor search
Nearest neighbor algorithm
access tree
Measurement
local integral hash nearest neighbor algorithm
Local integral hash
high dimensional data
fast search algorithm
fast retrieval algorithms
data distribution characteristics
computer image algorithm
hash algorithms
biblio
A novel security mechanism using hybrid cryptography algorithms
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
AES
Algorithm design and analysis
Compositionality
encryption
hash algorithms
Hybrid Cryptography
MD5
Protocols
pubcrawl
Public key
Receivers
Resiliency
RSA
security
biblio
Correctness of the routing algorithm for distributed key-value store based on order preserving linear hashing and skip graph
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
overlay networks
uniform routing table
telecommunication network routing
skip graph
routing algorithm
Routing
Resiliency
query forwarding
pubcrawl
Peer-to-peer computing
Partitioning algorithms
arrays
overlay network
order preserving linear hashing
linear hashing
Limiting
hop reduction
hash algorithms
graph theory
distributed key-value store
Distributed databases
Compositionality
biblio
A Remote-Attestation-Based Extended Hash Algorithm for Privacy Protection
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
Algorithm design and analysis
Compositionality
Economics
Extended hash algorithm
hash algorithms
Measurement
Merkle hash tree
Niobium
privacy
privacy protection
pubcrawl
Remote Attestation
Resiliency
security
Software algorithms
Trusted Computing
biblio
T/Key: Second-Factor Authentication From Secure Hash Chains
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
composability
Compositionality
hash algorithms
hash chains
pubcrawl
Resiliency
two factor authentication
two-factor authentication
biblio
Deep Asymmetric Pairwise Hashing
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
asymmetric hashing
binary code
Compositionality
deep hashing
hash algorithms
pubcrawl
Resiliency
biblio
LSH Forest: Practical Algorithms Made Theoretical
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
Compositionality
hash algorithms
pubcrawl
Resiliency
biblio
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
Compositionality
depth-robust graphs
hash algorithms
Hash functions
key stretching
memory hard functions
pubcrawl
Resiliency
biblio
Deep Progressive Hashing for Image Retrieval
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
Compositionality
deep hashing
expandability
hash algorithms
image retrieval
pubcrawl
Recurrent neural networks
Resiliency
saliency
biblio
Pseudo Label Based Unsupervised Deep Discriminative Hashing for Image Retrieval
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
Compositionality
deep hashing
hash algorithms
pseudo labels
pubcrawl
Resiliency
unsupervised hashing
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »