Sciweavers

33 search results - page 4 / 7
» Index Policies for Shooting Problems
Sort
View
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
13 years 2 months ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters
SIGMOD
2007
ACM
196views Database» more  SIGMOD 2007»
15 years 11 months ago
Adaptive location constraint processing
An important problem for many location-based applications is the continuous evaluation of proximity relations among moving objects. These relations express whether a given set of ...
Zhengdao Xu, Hans-Arno Jacobsen
106
Voted
JCDL
2005
ACM
161views Education» more  JCDL 2005»
15 years 5 months ago
Downloading textual hidden web content through keyword queries
An ever-increasing amount of information on the Web today is available only through search interfaces: the users have to type in a set of keywords in a search form in order to acc...
Alexandros Ntoulas, Petros Zerfos, Junghoo Cho
CORR
2008
Springer
124views Education» more  CORR 2008»
14 years 11 months ago
Scheduling Kalman Filters in Continuous Time
A set of N independent Gaussian linear time invariant systems is observed by M sensors whose task is to provide the best possible steady-state causal minimum mean square estimate o...
Jerome Le Ny, Eric Feron, Munther A. Dahleh
WWW
2005
ACM
16 years 10 days ago
Three-level caching for efficient query processing in large Web search engines
Large web search engines have to answer thousands of queries per second with interactive response times. Due to the sizes of the data sets involved, often in the range of multiple...
Xiaohui Long, Torsten Suel