Many network solutions and overlay networks utilize probabilistic techniques to reduce information processing and networking costs. This survey article presents a number of …
C Dong, L Chen, Z Wen - Proceedings of the 2013 ACM SIGSAC …, 2013 - dl.acm.org
Large scale data processing brings new challenges to the design of privacy-preserving protocols: how to meet the increasing requirements of speed and throughput of modern …
Recent work in structure from motion (SfM) has successfully built 3D models from large unstructured collections of images downloaded from the Internet. Most approaches use …
Sensitive personal data are created in many application domains, and there is now an increasing demand to share, integrate, and link such data within and across organisations in …
Bloom filters provide space-efficient storage of sets at the cost of a probability of false positives on membership queries. The size of the filter must be defined a priori based on the …
A standard technique from the hashing literature is to use two hash functions h 1 (x) and h 2 (x) to simulate additional hash functions of the form gi (x)= h 1 (x)+ ih 2 (x). We demonstrate …
A Bay, Z Erkin, JH Hoepman… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Privacy-preserving techniques for processing sets of information have attracted the research community's attention in recent years due to society's increasing dependency on the …
S Chen, L Yang, C Zhao, V Varadarajan, K Wang - Engineering, 2022 - Elsevier
As a future energy system, the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable services. However, this efficient and …
Bloom filters are space-efficient probabilistic data structures that are used to test whether an element is a member of a set, and may return false positives. Recently, variations referred to …