Sciweavers

5525 search results - page 993 / 1105
» Verification of Model Transformations
Sort
View
99
Voted
CRYPTO
2005
Springer
120views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS), providing new de...
Michel Abdalla, Mihir Bellare, Dario Catalano, Eik...
CVBIA
2005
Springer
15 years 6 months ago
Shape Based Segmentation of Anatomical Structures in Magnetic Resonance Images
Standard image based segmentation approaches perform poorly when there is little or no contrast along boundaries of different regions. In such cases, segmentation is largely perfor...
Kilian M. Pohl, John W. Fisher III, Ron Kikinis, W...
DAWAK
2005
Springer
15 years 6 months ago
Optimizing a Sequence of Frequent Pattern Queries
Discovery of frequent patterns is a very important data mining problem with numerous applications. Frequent pattern mining is often regarded as advanced querying where a user speci...
Mikolaj Morzy, Marek Wojciechowski, Maciej Zakrzew...
ICCSA
2005
Springer
15 years 6 months ago
Sinogram Denoising of Cryo-Electron Microscopy Images
Cryo-electron microscopy has recently been recognized as a useful alternative to obtain three-dimensional density maps of macromolecular complexes, especially when crystallography ...
Taneli Mielikäinen, Janne Ravantti
106
Voted
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 6 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng