We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Developing and analyzing schedules is essential for successfully controlling the time aspect of construction projects. The critical path method of scheduling is by far the most wi...
odel of Embodiment on Abstract Systems: from Hierarchy to Heterarchy Kohei Nakajima, Soya Shinkai, Takashi Ikegami A Behavior-Based Model of the Hydra, Phylum Cnidaria Malin Aktius...
We propose a new Bayesian approach to object-based image retrieval with relevance feedback. Although estimating the object posterior probability density from few examples seems in...
Derek Hoiem, Rahul Sukthankar, Henry Schneiderman,...
The research in information extraction (IE) regards the generation of wrappers that can extract particular information from semistructured Web documents. Similar to compiler gener...