Distributed Hash Table
Theory, Platforms and Applications
Chapter and Conference Paper
Micro-expressions are momentary involuntary facial expressions which may expose a person’s true emotions. Previous work in micro-expression detection mainly focus on finding the peak frame from a video sequenc...
Chapter and Conference Paper
With the widespread use of smart devices, a huge volume of data is generated every day, which is helpful for device user and device enterprises. However, the data generated by the smart device contains the us...
Article
In this paper, a novel sparse recovery based reversible data hiding (RDH) method using the human visual system (HVS) is presented. To improve the low accuracy of existing predictors, a sparse recovery based pr...
Chapter and Conference Paper
Bamboo flowering is a complicate phenomenon for its long period and unpredictability. In this study, three successive stages of flowering buds from flowering bamboo (Lei bamboo, Phyllostachys violascens) plants a...
Chapter and Conference Paper
In recent years, digital rights management (DRM) in Peer to Peer (P2P) network becomes more and more important. We propose a novel DRM scheme based on P2P to protect valuable digital content. The digital conte...
Article
To design an efficient and secure data aggregation scheme fitting real applications has been pursued by research communities for a long time. In this paper, we propose a novel secure data aggregation scheme to...
Article
To authenticate integrity of the stereo image for three dimensional video systems, a new asymmetric self-recovery oriented stereo image watermarking method is proposed by considering inter-correlations betwee...
Article
Edge detection is a long standing but still challenging problem. Although there are many effective edge detectors, none of them can obtain ideal edges in every situation. To make the results robust for any ima...
Chapter and Conference Paper
Magnetic field fluctuations in modern buildings can derive from both natural and man-made sources, which typically include steel, reinforced concrete structures, and electric power systems, etc. Since the anom...
Chapter and Conference Paper
This paper addresses an adaptive step detection algorithm using inertial sensors commonly found on commodity mobile phone. After analyzing the acceleration data collected by the accelerometer in mobile phone, ...
Book
Chapter
Nowadays distributed hash table (DHT) [1, 2] plays an important role in distributed systems and applications, especially in large-scale distributed environments. In the normal Client/Server model (C/S model) s...
Chapter
In the above chapters, we summarize the theory, platforms and applications of DHT. In theory, there are plenty of variants of DHT, which provide many choices for constructing DHT-based platforms and applicatio...
Chapter
In this chapter, we discuss a set of DHT variants, which widely influence the design and development of distributed systems in recent years. In each section, we first describe the structure of each variant, pr...
Chapter
Like Pythagorean theorem and Newton Law, excellent theories are always simple and graceful. DHT, which performs so graceful that only two basic operations: get data from DHT and put data into DHT, is wildly used ...
Chapter
Based on the theory of DHT, many researchers develop platforms, that implement different kinds of DHT and provide interfaces and services to applications. DHT translation from theory to platform is not a simpl...
Chapter and Conference Paper
Content caching plays an important role in content-centric networks. The current design of content-centric networks adopts a limited, en-route hierarchical caching mechanism, and caching and forwarding are lar...
Chapter and Conference Paper
This paper presents a new method of human activity recognition, which is based on \(\mathfrak{R}\) transform and non-linear SVM D...
Article
In a fingerprint recognition system, templates are stored in the server database. To avoid the privacy concerns in case the database is compromised, many approaches of securing biometrics templates such as bio...
Chapter and Conference Paper
This paper presents a new classification method for single person’s motion, which is represented by ℜ transform descriptor and classified by Linear-chain Conditional Random Fields. What it solves is that the g...