Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
Abstract. As wireless networks become a critical part of home, business and industrial infrastructure, researchers will meet these demands by providing new networking technologies....
Ehsan Nourbakhsh, Jeff Dix, Paul Johnson, T. Ryan ...
Quality of Experience (QoE) is the subjective judgment of the satisfaction an end user perceives from an application running over a given network topology and configuration. The in...
Studying examples of expert case-based adaptation could advance computational modeling but only if the examples can be succinctly represented and reliably interpreted. Supreme Cour...
Kevin D. Ashley, Collin Lynch, Niels Pinkwart, Vin...
A two-stage approach for word-wise identification of English (Roman), Devnagari and Bengali (Bangla) scripts is proposed. This approach balances the tradeoff between recognition a...
Sukalpa Chanda, Srikanta Pal, Katrin Franke, Umapa...