Sciweavers

137 search results - page 22 / 28
» Verifiable Attribute Based Encryption
Sort
View
KDD
2004
ACM
148views Data Mining» more  KDD 2004»
16 years 2 days ago
Interestingness of frequent itemsets using Bayesian networks as background knowledge
The paper presents a method for pruning frequent itemsets based on background knowledge represented by a Bayesian network. The interestingness of an itemset is defined as the abso...
Szymon Jaroszewicz, Dan A. Simovici
PRL
2007
200views more  PRL 2007»
14 years 11 months ago
Generative learning of visual concepts using multiobjective genetic programming
This paper introduces a novel method of visual learning based on Genetic Programming, which evolves a population of individuals (image analysis programs) that process attributed v...
Krzysztof Krawiec
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
15 years 12 months ago
Authenticated join processing in outsourced databases
Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous aut...
Yin Yang, Dimitris Papadias, Stavros Papadopoulos,...
107
Voted
HPDC
2010
IEEE
15 years 22 days ago
A hybrid Markov chain model for workload on parallel computers
This paper proposes a comprehensive modeling architecture for workloads on parallel computers using Markov chains in combination with state dependent empirical distribution functi...
Anne Krampe, Joachim Lepping, Wiebke Sieben
INFOCOM
2000
IEEE
15 years 4 months ago
Freeze-TCP: A True End-to-End TCP Enhancement Mechanism for Mobile Environments
Abstract— Optimizing TCP (Transport Layer) for mobility has been researched extensively. We present a brief summary of existing results which indicates that most schemes require ...
Tom Goff, James Moronski, Dhananjay S. Phatak, Vip...