In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Abstract. The proposed work exploits methods and techniques for automatic characterization of images for content-based access to personal photo libraries. Several techniques, even ...
—Publish/Subscribe systems have been extensively studied in the context of distributed information-based systems, and have proven scalable in information-dissemination for many d...
Many speed-up techniques for route planning in static graphs exist, only few of them are proven to work in a dynamic scenario. Most of them use preprocessed information, which has ...
Kernel-based tracking approaches have proven to be more efficient in computation compared to other tracking approaches such as particle filtering. However, existing kernel-based...