|
|
|
Liping Zhang, Jing Li and Song Li
A new spatial keyword group query method is proposed in this paper to address the existing issue of user privacy leakage and exclusion of preferences in road networks. The proposed query method is based on the IGgram-tree index and minimum hash set. To d...
ver más
|
|
|
|
|
|
|
Mario Alviano
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values wi...
ver más
|
|
|
|
|
|
|
Santiago Tapia-Fernández, Daniel García-García and Pablo García-Hernandez
Most computer programs or applications need fast data structures. The performance of a data structure is necessarily influenced by the complexity of its common operations; thus, any data-structure that exhibits a theoretical complexity of amortized const...
ver más
|
|
|
|
|
|
|
Daeyoub Kim and Jihoon Lee
One of the most common approaches for enhancing network performance is to retrieve data from nearby data holders that have previously obtained the desired data, not only from the original data source itself. In this case, since a data receiver cannot ide...
ver más
|
|
|
|
|
|
|
Ting Huang, Zhengping Weng, Gang Liu and Zhenwen He
To manage multidimensional point data more efficiently, this paper presents an improvement, called HD-tree, of a previous indexing method, called D-tree. Both structures combine quadtree-like partitioning (using integer shift operations without storing i...
ver más
|
|
|
|
|
|
|
Yi-Cheng Chen, Yueh-Peng Chou and Yung-Chen Chou
Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes...
ver más
|
|
|
|