Sciweavers

57 search results - page 11 / 12
» Safe query objects: statically typed objects as remotely exe...
Sort
View
EDBT
2009
ACM
108views Database» more  EDBT 2009»
13 years 10 months ago
Reverse k-nearest neighbor search in dynamic and general metric databases
In this paper, we propose an original solution for the general reverse k-nearest neighbor (RkNN) search problem. Compared to the limitations of existing methods for the RkNN searc...
Elke Achtert, Hans-Peter Kriegel, Peer Kröger...
SPIESR
2004
118views Database» more  SPIESR 2004»
13 years 7 months ago
New method for visual descriptor evaluation
Evaluation in visual information retrieval is usually performed by executing test queries and calculating recall and precision based on predefined media collections and ground tru...
Horst Eidenberger
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
13 years 11 months ago
Computational criticisms of the revelation principle
The revelation principle is a cornerstone tool in mechanism design. It states that one can restrict attention, without loss in the designer’s objective, to mechanisms in which A...
Vincent Conitzer, Tuomas Sandholm
AGTIVE
1999
Springer
13 years 10 months ago
Support for Design Patterns Through Graph Transformation Tools
A suitable software architecture –for example in the area of distributed application– can be composed of known-to-work solutions. These are also known as design patterns. Howev...
Ansgar Radermacher
EUROCRYPT
2010
Springer
13 years 11 months ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...