Sciweavers

3218 search results - page 175 / 644
» Timed Extensions for SDL
Sort
View
ITIIS
2010
200views more  ITIIS 2010»
14 years 11 months ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee
JAIR
2010
130views more  JAIR 2010»
14 years 11 months ago
Interactive Cost Configuration Over Decision Diagrams
In many AI domains such as product configuration, a user should interactively specify a solution that must satisfy a set of constraints. In such scenarios, offline compilation of ...
Henrik Reif Andersen, Tarik Hadzic, David Pisinger
PAMI
2010
162views more  PAMI 2010»
14 years 11 months ago
Differential Earth Mover's Distance with Its Applications to Visual Tracking
The Earth Mover's Distance (EMD) is a similarity measure that captures perceptual difference between two distributions. Its computational complexity, however, prevents a direc...
Qi Zhao, Zhi Yang, Hai Tao
155
Voted
PVLDB
2010
111views more  PVLDB 2010»
14 years 11 months ago
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting
Recent legislation has increased the requirements of organizations to report data breaches, or unauthorized access to data. While access control policies are used to restrict acce...
Daniel Fabbri, Kristen LeFevre, Qiang Zhu
SCL
2010
132views more  SCL 2010»
14 years 11 months ago
Convergence in human decision-making dynamics
A class of binary decision-making tasks called the two-alternative forced-choice task has been used extensively in psychology and behavioral economics experiments to investigate h...
Ming Cao, Andrew Reed Stewart, Naomi Ehrich Leonar...