Sciweavers

941 search results - page 62 / 189
» The Parking Permit Problem
Sort
View
ICDM
2008
IEEE
120views Data Mining» more  ICDM 2008»
15 years 6 months ago
Parameter Tuning for Differential Mining of String Patterns
Constraint-based mining has been proven to be extremely useful for supporting actionable pattern discovery. However, useful conjunctions of constraints that support domain driven ...
Jérémy Besson, Christophe Rigotti, I...
ACNS
2007
Springer
136views Cryptology» more  ACNS 2007»
15 years 6 months ago
Identity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
Matthew Green, Giuseppe Ateniese
CIE
2007
Springer
15 years 6 months ago
Hierarchies in Fragments of Monadic Strict NP
We expose a strict hierarchy within monotone monadic strict NP without inequalities (MMSNP), based on the number of second-order monadic quantifiers. We do this by studying a fin...
Barnaby Martin, Florent R. Madelaine
ISI
2007
Springer
15 years 6 months ago
Organizing Hot-Spot Police Patrol Routes
—We address the problem of planning patrol routes to maximize coverage of important locations (hot spots) at minimum cost (length of patrol route). We model a road network using ...
Sudarshan S. Chawathe
ICDCSW
2006
IEEE
15 years 6 months ago
Network-Aware Overlays with Network Coordinates
Network coordinates, which embed network distance measurements in a coordinate system, were introduced as a method for determining the proximity of nodes for routing table updates...
Peter R. Pietzuch, Jonathan Ledlie, Michael Mitzen...