Sciweavers

3207 search results - page 551 / 642
» A Semantics for HTN Methods
Sort
View
ASIACRYPT
2005
Springer
14 years 3 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
CAV
2005
Springer
129views Hardware» more  CAV 2005»
14 years 3 months ago
Symbolic Systems, Explicit Properties: On Hybrid Approaches for LTL Symbolic Model Checking
In this work we study hybrid approaches to LTL symbolic model checking; that is, approaches that use explicit representations of the property automaton, whose state space is often ...
Roberto Sebastiani, Stefano Tonetta, Moshe Y. Vard...
CIKM
2005
Springer
14 years 3 months ago
Predicting accuracy of extracting information from unstructured text collections
Exploiting lexical and semantic relationships in large unstructured text collections can significantly enhance managing, integrating, and querying information locked in unstructur...
Eugene Agichtein, Silviu Cucerzan
CIVR
2005
Springer
160views Image Analysis» more  CIVR 2005»
14 years 3 months ago
Story Segmentation in News Videos Using Visual and Text Cues
Abstract. In this paper, we present a framework for segmenting the news programs into different story topics. The proposed method utilizes both visual and text information of the v...
Yun Zhai, Alper Yilmaz, Mubarak Shah
DBISP2P
2005
Springer
129views Database» more  DBISP2P 2005»
14 years 3 months ago
Querying a Super-Peer in a Schema-Based Super-Peer Network
We propose a novel approach for de ning and querying a super-peer within a schema-based super-peer network organized into a two-level architecture: the low level, called the peer l...
Domenico Beneventano, Sonia Bergamaschi, Francesco...