Sciweavers

1027 search results - page 2 / 206
» A Model for Java with Wildcards
Sort
View
CIKM
2007
Springer
13 years 11 months ago
Generalizing from relevance feedback using named entity wildcards
Traditional adaptive filtering systems learn the user’s interests in a rather simple way – words from relevant documents are favored in the query model, while words from irre...
Abhimanyu Lad, Yiming Yang
ACISP
2007
Springer
13 years 8 months ago
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
Abstract. We propose new instantiations of chosen-ciphertext secure identitybased encryption schemes with wildcards (WIBE). Our schemes outperform all existing alternatives in term...
James Birkett, Alexander W. Dent, Gregory Neven, J...
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 3 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
ISOLA
2004
Springer
13 years 10 months ago
A Rule Markup Language and its application to UML
In this paper we introduce RML, which stands for Rule Markup Language and is used for rule–based transformations of XML. With RML the user can define XML wildcard elements, vari...
Joost Jacob
JAVA
1999
Springer
13 years 9 months ago
Fixing the Java Memory Model
The Java memory model described in Chapter 17 of the Java Language Specification gives constraints on how threads interact through memory. The Java memory model is hard to interp...
William Pugh