We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An ema...
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky...
: 1 Invaluable feedback from HIICS referees is gratefully acknowledged. Mobile data services integrate handheld and Internet technologies to create new value propositions (Keen and...
Algorithms for tracking concept drift are important for many applications. We present a general method based on the Weighted Majority algorithm for using any online learner for co...
In this paper I give a brief overview of recent work on uncertainty inAI, and relate it to logical representations. Bayesian decision theory and logic are both normative frameworks...
Abstract. Trademark image retrieval is becoming an important application for logo registry, veri cation, and design. There are two major problems about the current approaches to tr...