Sciweavers

922 search results - page 107 / 185
» Attribute based data sharing with attribute revocation
Sort
View
CCS
2008
ACM
15 years 1 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
KDD
2004
ACM
148views Data Mining» more  KDD 2004»
16 years 8 days ago
Interestingness of frequent itemsets using Bayesian networks as background knowledge
The paper presents a method for pruning frequent itemsets based on background knowledge represented by a Bayesian network. The interestingness of an itemset is defined as the abso...
Szymon Jaroszewicz, Dan A. Simovici
IROS
2007
IEEE
154views Robotics» more  IROS 2007»
15 years 6 months ago
Ground truth evaluation of large urban 6D SLAM
Abstract— In the past many solutions for simultaneous localization and mapping (SLAM) have been presented. Recently these solutions have been extended to map large environments w...
Oliver Wulf, Andreas Nüchter, Joachim Hertzbe...
NOMS
2006
IEEE
15 years 5 months ago
Predicting Machine Availabilities in Desktop Pools
—This paper describes a study of predicting machine availabilities and user presence in a pool of desktop computers. The study is based on historical traces collected from 32 mac...
Artur Andrzejak, Patrício Domingues, Lu&iac...
AI
1998
Springer
14 years 11 months ago
Uncertainty Measures of Rough Set Prediction
The main statistics used in rough set data analysis, the approximation quality, is of limited value when there is a choice of competing models for predicting a decision variable. ...
Ivo Düntsch, Günther Gediga