Sciweavers

1420 search results - page 98 / 284
» Multi-point Constructive Search
Sort
View
CRYPTO
2007
Springer
172views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Deterministic and Efficiently Searchable Encryption
We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We ob...
Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
DAGSTUHL
2006
15 years 5 months ago
Clone Detector Use Questions: A List of Desirable Empirical Studies
Abstract. Code "clones" are similar segments of code that are frequently introduced by "scavenging" existing code, that is, reusing code by copying it and adapt...
Thomas R. Dean, Massimiliano Di Penta, Kostas Kont...
IJCAI
1989
15 years 5 months ago
Using and Refining Simplifications: Explanation-Based Learning of Plans in Intractable Domains
This paper describes an explanation-based approach lo learning plans despite a computationally intractable domain theory. In this approach, the system learns an initial plan using...
Steve A. Chien
KES
2006
Springer
15 years 4 months ago
Human Arm-Motion Classification Using Qualitative Normalised Templates
Abstract. This paper proposes an approach to classify human arm motion using qualitative normalized templates. The proposed method consists of construction of human arm model, qual...
Chee Seng Chan, Honghai Liu, David J. Brown
KES
2010
Springer
15 years 2 months ago
An Efficient Mechanism for Stemming and Tagging: The Case of Greek Language
In an era that, searching the WWW for information becomes a tedious task, it is obvious that mainly search engines and other data mining mechanisms need to be enhanced with charact...
Giorgos Adam, Konstantinos Asimakis, Christos Bour...