Sciweavers

3270 search results - page 245 / 654
» Approximate String Processing
Sort
View
SIGIR
2005
ACM
15 years 8 months ago
Web-based acquisition of Japanese katakana variants
This paper describes a method of detecting Japanese Katakana variants from a large corpus. Katakana words, which are mainly used as loanwords, cause problems with information retr...
Takeshi Masuyama, Hiroshi Nakagawa
ASIACRYPT
2005
Springer
15 years 8 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
CIARP
2004
Springer
15 years 8 months ago
Detecting Inflection Patterns in Natural Language by Minimization of Morphological Model
One of the most important steps in text processing and information retrieval is stemming—reducing of words to stems expressing their base meaning, e.g., bake, baked, bakes, bakin...
Alexander F. Gelbukh, Mikhail Alexandrov, Sang-Yon...
114
Voted
VLDB
2004
ACM
113views Database» more  VLDB 2004»
15 years 8 months ago
Auditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...
ASIACRYPT
2003
Springer
15 years 8 months ago
Accumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been a very active research topic in recent years. A group signature can be viewed as a digital signature wit...
Gene Tsudik, Shouhuai Xu