Last modified: 2019-04-21
References
[1] C.-R. Shyu, C. Brodley, A. Kak, A. Kosaka, A. Aisen, and L. Broderick, "Local versus global features for content-based image retrieval," in Proceedings. IEEE Workshop on Content-Based Access of Image and Video Libraries (Cat. No. 98EX173), 1998, pp. 30-34.
[2] D. A. Lisin, M. A. Mattar, M. B. Blaschko, E. G. Learned-Miller, and M. C. Benfield, "Combining local and global image features for object class recognition," in 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05)-Workshops, 2005, pp. 47-47.
[3] N. Lee, C. Kim, W. Choi, M. Pyeon, and Y. Kim, "Development of indoor localization system using a mobile data acquisition platform and BoW image matching," KSCE Journal of Civil Engineering, vol. 21, pp. 418-430, 2017.
[4] S. S. Hwang and S. H. Hong, "Pre-extraction of Features and Environment Variable-based Database Filtering for Fast Image Matching on Mobile," in Mobile and Wireless Technologies 2016, ed: Springer, 2016, pp. 223-230.
[5] J. Machajdik and A. Hanbury, "Affective image classification using features inspired by psychology and art theory," in Proceedings of the 18th ACM international conference on Multimedia, 2010, pp. 83-92.
[6] L. Wang and H. Wang, "Improving feature matching strategies for efficient image retrieval," Signal Processing: Image Communication, vol. 53, pp. 86-94, 2017.
[7] M. Agarwal, A. Singhal, and B. Lall, "3D local ternary co-occurrence patterns for natural, texture, face and bio medical image retrieval," Neurocomputing, vol. 313, pp. 333-345, 2018.
[8] R. Li, Y. Zhao, Q. Xu, and X. Qi, "Research of Subnetting Based on Huffman Coding," in International Conference on Cloud Computing and Security, 2018, pp. 606-616.
[9] R. Patel, V. Kumar, V. Tyagi, and V. Asthana, "A fast and improved image compression technique using Huffman coding," in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 2283-2286.
[10] I.-C. Lin and L.-C. Yang, "A Noise Generation Scheme Based on Huffman Coding for Preserving Privacy," in International Conference on Security with Intelligent Computing and Big-data Services, 2017, pp. 149-160.
[11] M. Sharma, "Compression using Huffman coding," IJCSNS International Journal of Computer Science and Network Security, vol. 10, pp. 133-141, 2010.
[12] O. Yue-Long, L.-n. ZHANG, and N. Yu, "Researching on MD5's characteristics based on software reversing," The Journal of China Universities of Posts and Telecommunications, vol. 17, pp. 127-130, 2010.
[13] Ye Tian, Kun Zhang, Pu Wang, Yuming Zhang and Jun Yang , Add "Salt" MD5 Algorithm's FPGA Implementation, 8th International Congress of Information and Communication Technology (ICICT-2018), Procedia Computer Science 131 (2018) 255–260.
[14] D. Pamula and A. Ziebinski, Hardware implementation of the MD5 algorithm, 9th IFAC Workshop on Programmable Devices and Embedded Systems, Roznov pod Radhostem, Czech Republic, February 10-12, 2009.
[15] K. Miller, F. Franz, M. Rittinghaus, M. Hillenbrand, and F. Bellosa, "{XLH}: More Effective Memory Deduplication Scanners Through Cross-layer Hints," in Presented as part of the 2013 {USENIX} Annual Technical Conference ({USENIX}{ATC} 13), 2013, pp. 279-290.
[16] S.-h. Kim, J. Jeong, and J. Lee, "Selective memory deduplication for cost efficiency in mobile smart devices," IEEE Transactions on Consumer Electronics, vol. 60, pp. 276-284, 2014.
[17] T. Liu, F. Chen, Y. Ma, and Y. Xie, "An energy-efficient task scheduling for mobile devices based on cloud assistant," Future Generation Computer Systems, vol. 61, pp. 1-12, 2016.
[18] E. Ahmed, A. Gani, M. Sookhak, S. H. Ab Hamid, and F. Xia, "Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges," Journal of Network and Computer Applications, vol. 52, pp. 52-68, 2015.
[19] R. N. Widodo, H. Lim, and M. Atiquzzaman, "SDM: Smart deduplication for mobile cloud storage," Future Generation Computer Systems, vol. 70, pp. 64-73, 2017.
[20] M. W. Storer, K. Greenan, D. D. Long, and E. L. Miller, "Secure data deduplication," in Proceedings of the 4th ACM international workshop on Storage security and survivability, 2008, pp. 1-10.
[21] N. Haustein, C. A. Klein, U. Troppens, and D. J. Winarski, "Method of and system for adaptive selection of a deduplication chunking technique," ed: Google Patents, 2009.
[22] B. Zhu, K. Li, and R. H. Patterson, "Avoiding the Disk Bottleneck in the Data Domain Deduplication File System," in Fast, 2008, pp. 1-14.
[23] D. Meister and A. Brinkmann, "Multi-level comparison of data deduplication in a backup scenario," in Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, 2009, p. 8.
[24] Y. Won, R. Kim, J. Ban, J. Hur, S. Oh, and J. Lee, "Prun: eliminating information redundancy for large scale data backup system," in 2008 International Conference on Computational Sciences and Its Applications, 2008, pp. 139-144.