|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT |
2015-09-04 10:15 |
Ishikawa |
Hakusan Shobutei |
Nested Lattice Hashing Scheme for Similarity Search Applications Thanh Xuan Nguyen, Ricardo Antonio Parrao Hernandez, Brian Michael Kurkoski (JAIST) IT2015-37 |
This research targets improving similarity search efficiency using a nested lattice hashing scheme. Similarity search ha... [more] |
IT2015-37 pp.19-24 |
ICSS |
2015-03-04 15:55 |
Okinawa |
Meio Univiersity |
Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2014-96 |
Recent cyber attacks frequently use variants of malware programs where existing functions are drastically improved and n... [more] |
ICSS2014-96 pp.199-204 |
ICD, CPSY |
2014-12-01 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Poster Presentation]
A Scalable Hardware Architecture of Locality-Sesitive Hashing for similarity Search Tsunaki Sadahisa, Kasho Yamamoto, Dahoo Kim, Eric S. Fukuda, Tetsuya Asai, Masato Motomura (Hokkaido Univ.) ICD2014-83 CPSY2014-95 |
Locality-Sensitive Hashing (LSH) is a hash function that projects similar data into memory closely. In similarity search... [more] |
ICD2014-83 CPSY2014-95 p.45 |
ISEC, LOIS |
2010-11-17 15:15 |
Ibaraki |
Tsukuba Univ. |
Similarity Hashing resistant to file modifications Susumu Serita, Yasuhiro Fujii, Satoshi Kai, Takao Murakami, Yoshinori Honda (Hitachi, Ltd.) ISEC2010-54 LOIS2010-33 |
Similar files in PCs and servers need to be identified quickly and accurately, and this can be done by using similarity ... [more] |
ISEC2010-54 LOIS2010-33 pp.31-36 |
IBISML |
2010-06-14 10:25 |
Tokyo |
Takeda Hall, Univ. Tokyo |
[Invited Talk]
All Pairs Similarity Search by Multiple Sorting Koji Tsuda (AIST) IBISML2010-2 |
Recently it is increasingly common that images and signals are mapped to bit strings called sketches.
To build a simila... [more] |
IBISML2010-2 p.3 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|