Sciweavers

2821 search results - page 491 / 565
» Tracing a single user
Sort
View
PROVSEC
2010
Springer
14 years 9 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
SIGIR
2010
ACM
14 years 9 months ago
DivQ: diversification for keyword search over structured databases
Keyword queries over structured databases are notoriously ambiguous. No single interpretation of a keyword query can satisfy all users, and multiple interpretations may yield over...
Elena Demidova, Peter Fankhauser, Xuan Zhou, Wolfg...
UIC
2010
Springer
14 years 9 months ago
A Smartphone-Based Obstacle Sensor for the Visually Impaired
In this paper, we present a real-time obstacle detection system for the mobility improvement for the visually impaired using a handheld Smartphone. Though there are many existing a...
En Peng, Patrick Peursum, Ling Li, Svetha Venkates...
CDC
2009
IEEE
110views Control Systems» more  CDC 2009»
14 years 9 months ago
Perturbation analysis and optimization of multiclass multiobjective Stochastic Flow Models
Stochastic Flow Models (SFMs) are stochastic ystems that abstract the dynamics of complex discrete event systems involving the control of sharable resources. SFMs have been used to...
Chen Yao, Christos G. Cassandras
EUSFLAT
2009
162views Fuzzy Logic» more  EUSFLAT 2009»
14 years 9 months ago
Discussions on Interpretability of Fuzzy Systems using Simple Examples
Two conflicting goals are often involved in the design of fuzzy rule-based systems: Accuracy maximization and interpretability maximization. A number of approaches have been propos...
Hisao Ishibuchi, Yusuke Nojima