Sciweavers

1419 search results - page 276 / 284
» group 2010
Sort
View
SCN
2010
Springer
187views Communications» more  SCN 2010»
14 years 7 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
93
Voted
SIAMJO
2010
121views more  SIAMJO 2010»
14 years 7 months ago
Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid
Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerabilit...
Ali Pinar, Juan Meza, Vaibhav Donde, Bernard C. Le...
SMC
2010
IEEE
186views Control Systems» more  SMC 2010»
14 years 7 months ago
Semantic enrichment of text representation with wikipedia for text classification
—Text classification is a widely studied topic in the area of machine learning. A number of techniques have been developed to represent and classify text documents. Most of the t...
Hiroki Yamakawa, Jing Peng, Anna Feldman
TIP
2010
138views more  TIP 2010»
14 years 7 months ago
Motion Tuned Spatio-Temporal Quality Assessment of Natural Videos
—There has recently been a great deal of interest in the development of algorithms that objectively measure the integrity of video signals. Since video signals are being delivere...
Kalpana Seshadrinathan, Alan C. Bovik
TKDE
2010
195views more  TKDE 2010»
14 years 7 months ago
Query Processing Using Distance Oracles for Spatial Networks
—The popularity of location-based services and the need to do real-time processing on them has led to an interest in performing queries on transportation networks, such as findin...
Jagan Sankaranarayanan, Hanan Samet