An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
This paper presents a survey on the major approaches to search interface understanding. The Deep Web consists of data that exist on the Web but are inaccessible via text search en...
Abstract — The natural environments that robotic applications often encounter can present difficult problems for imagebased task execution. Prior efforts have used both grayscale...
This paper proposes an immune concentration based virus detection approach which utilizes a two-element concentration vector to construct the feature. In this approach, ‘self’ ...
Abstract—Automatic summarization evaluation is very important to the development of summarization systems. In text summarization, ROUGE has been shown to correlate well with huma...