92   Artículos

« Anterior     Página: 1 de 5     Siguiente »

 
en línea
Santiago Tapia-Fernández, Daniel García-García and Pablo García-Hernandez    
Most computer programs or applications need fast data structures. The performance of a data structure is necessarily influenced by the complexity of its common operations; thus, any data-structure that exhibits a theoretical complexity of amortized const... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Mario Alviano    
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values wi... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Kaimeng Ding, Yueming Liu, Qin Xu and Fuqiang Lu    
Data security technology is of great significance to the application of high resolution remote sensing image (HRRS) images. As an important data security technology, perceptual hash overcomes the shortcomings of cryptographic hashing that is not robust a... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Hongming Li, Lilai Zhang, Hao Cao and Yirui Wu    
Deoxyribonucleic Acid (DNA) computing has demonstrated great potential in data encryption due to its capability of parallel computation, minimal storage requirement, and unbreakable cryptography. Focusing on high-dimensional image data for encryption wit... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Wenxiao Li, Hongyan Mei, Yutian Li, Jiayao Yu, Xing Zhang, Xiaorong Xue and Jiahao Wang    
Due to the fast retrieval speed and low storage cost, cross-modal hashing has become the primary method for cross-modal retrieval. Since the emergence of deep cross-modal hashing methods, cross-modal retrieval significantly improved. However, the existin... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Argyrios Sideris, Theodora Sanida and Minas Dasygenis    
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit... ver más
Revista: Information    Formato: Electrónico

 
en línea
Youmeng Luo, Wei Li, Xiaoyu Ma and Kaiqiang Zhang    
With the continuous progress of image retrieval technology, in the field of image retrieval, the speed of a search for a desired image from a great deal of image data becomes a hot issue. Convolutional Neural Networks (CNN) have been used in the field of... ver más
Revista: Information    Formato: Electrónico

 
en línea
Emmanuel A. Adeniyi, Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen and Salil Bharany    
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users? credentials and sensitive information. Therefore, ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Wei Wang, Xiaojing Yao and Jing Chen    
Tiled maps are one of the key GIS technologies used in the development and construction of WebGIS in the era of big data; there is an urgent need for high-performance tile map services hosted on big data GIS platforms. To address the current inefficiency... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Yurika Pant Khanal, Abeer Alsadoon, Khurram Shahzad, Ahmad B. Al-Khalil, Penatiyana W. C. Prasad, Sabih Ur Rehman and Rafiqul Islam    
Blockchain technology has been widely advocated for security and privacy in IoT systems. However, a major impediment to its successful implementation is the lack of privacy protection regarding user access policy while accessing personal data in the IoT ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Wenjing Yang, Liejun Wang, Shuli Cheng, Yongming Li and Anyu Du    
Recently, deep learning to hash has extensively been applied to image retrieval, due to its low storage cost and fast query speed. However, there is a defect of insufficiency and imbalance when existing hashing methods utilize the convolutional neural ne... ver más
Revista: Information    Formato: Electrónico

 
en línea
Thorsten Roth, Martin Weier, Pablo Bauszat, André Hinkenjann and Yongmin Li    
Modern Monte-Carlo-based rendering systems still suffer from the computational complexity involved in the generation of noise-free images, making it challenging to synthesize interactive previews. We present a framework suited for rendering such previews... ver más
Revista: Computers    Formato: Electrónico

 
en línea
David García-Retuerta, Álvaro Bartolomé, Pablo Chamoso and Juan Manuel Corchado    
The Internet is becoming a major source of radicalization. The propaganda efforts of new extremist groups include creating new propaganda videos from fragments of old terrorist attack videos. This article presents a web-scraping method for retrieving rel... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Antonio PINTO,Ricardo COSTA     Pág. 43 - 57

 
en línea
Diego Renza, Jaime Andres Arango and Dora Maria Ballesteros    
This paper addresses a problem in the field of audio forensics. With the aim of providing a solution that helps Chain of Custody (CoC) processes, we propose an integrity verification system that includes capture (mobile based), hash code calculation and ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yesid Díaz Gutiérrez, Juan Manuel Cueva Lovelle     Pág. 82 - 87
ResumenDescargasReferenciasCómo citar
Revista: Redes de IngenierÍ­a    Formato: Electrónico

 
en línea
Zixuan Guo, Qing Xie, Song Liu and Xiaoyao Xie    
This research addresses an essential component in the practical application of NeRF by working toward enhancing the reconstruction efficiency, especially in scenarios without precise pose estimation. The improvements presented in this research underscore... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Shams Mhmood Abd Ali, Mohd Najwadi Yusoff and Hasan Falah Hasan    
The continuous advancements of blockchain applications impose constant improvements on their technical features. Particularly immutability, a highly secure blockchain attribute forbidding unauthorized or illicit data editing or deletion, which functions ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Aleksey I. Pakhomchik, Vladimir V. Voloshinov, Valerii M. Vinokur and Gordey B. Lesovik    
There exists a wide range of constraint programming (CP) problems defined on Boolean functions depending on binary variables. One of the approaches to solving CP problems is using specific appropriate solvers, e.g., SAT solvers. An alternative is using t... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Jean-François Determe, Sophia Azzagnuni, François Horlin and Philippe De Doncker    
Research has shown that counting WiFi packets called probe requests (PRs) implicitly provides a proxy for the number of people in an area. In this paper, we discuss a crowd counting system involving WiFi sensors detecting PRs over the air, then extractin... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 5     Siguiente »