Sciweavers

285 search results - page 24 / 57
» New Ways to Construct Binary Search Trees
Sort
View
IACR
2011
104views more  IACR 2011»
13 years 11 months ago
Short Transitive Signatures for Directed Trees
A transitive signature scheme allows to sign a graph in such a way that, given the signatures of edges (a, b) and (b, c), it is possible to compute the signature for the edge (or ...
Philippe Camacho, Alejandro Hevia
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
14 years 11 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
89
Voted
ICCSA
2007
Springer
15 years 5 months ago
Public Key Encryption with Keyword Search Based on K-Resilient IBE
An encrypted email is sent from Bob to Alice. A gateway wants to check whether a certain keyword exists in an email or not for some reason (e.g. routing). Nevertheless Alice does n...
Dalia Khader
EVOW
2008
Springer
15 years 1 months ago
Improving Query Expansion with Stemming Terms: A New Genetic Algorithm Approach
Nowadays, searching information in the web or in any kind of document collection has become one of the most frequent activities. However, user queries can be formulated in a way th...
Lourdes Araujo, José R. Pérez-Ag&uum...
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 6 months ago
Physical expander in Virtual Tree Overlay
Abstract. In this paper, we propose a new construction of constantdegree expanders motivated by their application in P2P overlay networks and in particular in the design of robust ...
Taisuke Izumi, Maria Potop-Butucaru, Mathieu Valer...