Sciweavers

553 search results - page 77 / 111
» Perfect difference sets constructed from Sidon sets
Sort
View
WWW
2008
ACM
16 years 15 days ago
Hidden sentiment association in chinese web opinion mining
The boom of product review websites, blogs and forums on the web has attracted many research efforts on opinion mining. Recently, there was a growing interest in the finergrained ...
Qi Su, Xinying Xu, Honglei Guo, Zhili Guo, Xian Wu...
PODS
2008
ACM
152views Database» more  PODS 2008»
15 years 12 months ago
Towards a theory of schema-mapping optimization
A schema mapping is a high-level specification that describes the relationship between two database schemas. As schema mappings constitute the essential building blocks of data ex...
Ronald Fagin, Phokion G. Kolaitis, Alan Nash, Luci...
ESORICS
2008
Springer
15 years 1 months ago
Improved Security Notions and Protocols for Non-transferable Identification
Abstract. Different security notions and settings for identification protocols have been proposed so far, considering different powerful adversaries that can play "man-in-the-...
Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadegh...
ISCI
2008
67views more  ISCI 2008»
14 years 11 months ago
A multiview approach for intelligent data analysis based on data operators
Multiview intelligent data analysis explores data from different perspectives to reveal various types of structures and knowledge embedded in the data. Each view may capture a spe...
Yaohua Chen, Yiyu Yao
ASIACRYPT
2003
Springer
15 years 5 months ago
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes
Abstract. We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). Broadcast Encryption allows a broadcaster to broadcast an encrypted m...
Nuttapong Attrapadung, Kazukuni Kobara, Hideki Ima...