|
|
|
Santiago Tapia-Fernández, Daniel García-García and Pablo García-Hernandez
Most computer programs or applications need fast data structures. The performance of a data structure is necessarily influenced by the complexity of its common operations; thus, any data-structure that exhibits a theoretical complexity of amortized const...
ver más
|
|
|
|
|
|
|
Mario Alviano
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values wi...
ver más
|
|
|
|
|
|
|
Kaimeng Ding, Yueming Liu, Qin Xu and Fuqiang Lu
Data security technology is of great significance to the application of high resolution remote sensing image (HRRS) images. As an important data security technology, perceptual hash overcomes the shortcomings of cryptographic hashing that is not robust a...
ver más
|
|
|
|
|
|
|
Hongming Li, Lilai Zhang, Hao Cao and Yirui Wu
Deoxyribonucleic Acid (DNA) computing has demonstrated great potential in data encryption due to its capability of parallel computation, minimal storage requirement, and unbreakable cryptography. Focusing on high-dimensional image data for encryption wit...
ver más
|
|
|
|
|
|
|
Wenxiao Li, Hongyan Mei, Yutian Li, Jiayao Yu, Xing Zhang, Xiaorong Xue and Jiahao Wang
Due to the fast retrieval speed and low storage cost, cross-modal hashing has become the primary method for cross-modal retrieval. Since the emergence of deep cross-modal hashing methods, cross-modal retrieval significantly improved. However, the existin...
ver más
|
|
|
|
|
|
|
Argyrios Sideris, Theodora Sanida and Minas Dasygenis
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit...
ver más
|
|
|
|
|
|
|
Youmeng Luo, Wei Li, Xiaoyu Ma and Kaiqiang Zhang
With the continuous progress of image retrieval technology, in the field of image retrieval, the speed of a search for a desired image from a great deal of image data becomes a hot issue. Convolutional Neural Networks (CNN) have been used in the field of...
ver más
|
|
|
|
|
|
|
Emmanuel A. Adeniyi, Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen and Salil Bharany
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users? credentials and sensitive information. Therefore, ...
ver más
|
|
|
|
|
|
|
Wei Wang, Xiaojing Yao and Jing Chen
Tiled maps are one of the key GIS technologies used in the development and construction of WebGIS in the era of big data; there is an urgent need for high-performance tile map services hosted on big data GIS platforms. To address the current inefficiency...
ver más
|
|
|
|
|
|
|
Yurika Pant Khanal, Abeer Alsadoon, Khurram Shahzad, Ahmad B. Al-Khalil, Penatiyana W. C. Prasad, Sabih Ur Rehman and Rafiqul Islam
Blockchain technology has been widely advocated for security and privacy in IoT systems. However, a major impediment to its successful implementation is the lack of privacy protection regarding user access policy while accessing personal data in the IoT ...
ver más
|
|
|
|
|
|
|
Wenjing Yang, Liejun Wang, Shuli Cheng, Yongming Li and Anyu Du
Recently, deep learning to hash has extensively been applied to image retrieval, due to its low storage cost and fast query speed. However, there is a defect of insufficiency and imbalance when existing hashing methods utilize the convolutional neural ne...
ver más
|
|
|
|
|
|
|
Thorsten Roth, Martin Weier, Pablo Bauszat, André Hinkenjann and Yongmin Li
Modern Monte-Carlo-based rendering systems still suffer from the computational complexity involved in the generation of noise-free images, making it challenging to synthesize interactive previews. We present a framework suited for rendering such previews...
ver más
|
|
|
|
|
|
|
David García-Retuerta, Álvaro Bartolomé, Pablo Chamoso and Juan Manuel Corchado
The Internet is becoming a major source of radicalization. The propaganda efforts of new extremist groups include creating new propaganda videos from fragments of old terrorist attack videos. This article presents a web-scraping method for retrieving rel...
ver más
|
|
|
|
|
|
|
Antonio PINTO,Ricardo COSTA
Pág. 43 - 57
|
|
|
|
|
|
|
Diego Renza, Jaime Andres Arango and Dora Maria Ballesteros
This paper addresses a problem in the field of audio forensics. With the aim of providing a solution that helps Chain of Custody (CoC) processes, we propose an integrity verification system that includes capture (mobile based), hash code calculation and ...
ver más
|
|
|
|
|
|
|
Yesid Díaz Gutiérrez, Juan Manuel Cueva Lovelle
Pág. 82 - 87
ResumenDescargasReferenciasCómo citar
|
|
|
|
|
|
|
Zixuan Guo, Qing Xie, Song Liu and Xiaoyao Xie
This research addresses an essential component in the practical application of NeRF by working toward enhancing the reconstruction efficiency, especially in scenarios without precise pose estimation. The improvements presented in this research underscore...
ver más
|
|
|
|
|
|
|
Shams Mhmood Abd Ali, Mohd Najwadi Yusoff and Hasan Falah Hasan
The continuous advancements of blockchain applications impose constant improvements on their technical features. Particularly immutability, a highly secure blockchain attribute forbidding unauthorized or illicit data editing or deletion, which functions ...
ver más
|
|
|
|
|
|
|
Aleksey I. Pakhomchik, Vladimir V. Voloshinov, Valerii M. Vinokur and Gordey B. Lesovik
There exists a wide range of constraint programming (CP) problems defined on Boolean functions depending on binary variables. One of the approaches to solving CP problems is using specific appropriate solvers, e.g., SAT solvers. An alternative is using t...
ver más
|
|
|
|
|
|
|
Jean-François Determe, Sophia Azzagnuni, François Horlin and Philippe De Doncker
Research has shown that counting WiFi packets called probe requests (PRs) implicitly provides a proxy for the number of people in an area. In this paper, we discuss a crowd counting system involving WiFi sensors detecting PRs over the air, then extractin...
ver más
|
|
|
|