Sciweavers

1575 search results - page 199 / 315
» The provenance of electronic data
Sort
View
CCS
2007
ACM
15 years 6 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
ISVC
2007
Springer
15 years 5 months ago
Automatic Image Representation for Content-Based Access to Personal Photo Album
Abstract. The proposed work exploits methods and techniques for automatic characterization of images for content-based access to personal photo libraries. Several techniques, even ...
Edoardo Ardizzone, Marco La Cascia, Filippo Vella
MDM
2007
Springer
15 years 5 months ago
State-Filters for Enhanced Filtering in Sensor-Based Publish/Subscribe Systems
—Publish/Subscribe systems have been extensively studied in the context of distributed information-based systems, and have proven scalable in information-dissemination for many d...
Salman Taherian, Jean Bacon
WEA
2007
Springer
74views Algorithms» more  WEA 2007»
15 years 5 months ago
Landmark-Based Routing in Dynamic Graphs
Many speed-up techniques for route planning in static graphs exist, only few of them are proven to work in a dynamic scenario. Most of them use preprocessed information, which has ...
Daniel Delling, Dorothea Wagner
ICMCS
2006
IEEE
167views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Efficient Object Tracking using Control-Based Observer Design
Kernel-based tracking approaches have proven to be more efficient in computation compared to other tracking approaches such as particle filtering. However, existing kernel-based...
Wei Qu, Dan Schonfeld