Sciweavers

433 search results - page 43 / 87
» Administrative and Public Verifiability: Can We Have Both
Sort
View
DCC
2010
IEEE
13 years 7 months ago
Efficient hybrid encryption from ID-based encryption
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until...
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
POPL
2005
ACM
14 years 8 months ago
Automated soundness proofs for dataflow analyses and transformations via local rules
We present Rhodium, a new language for writing compiler optimizations that can be automatically proved sound. Unlike our previous work on Cobalt, Rhodium expresses optimizations u...
Sorin Lerner, Todd D. Millstein, Erika Rice, Craig...
LREC
2008
95views Education» more  LREC 2008»
13 years 9 months ago
Application of Resource-based Machine Translation to Real Business Scenes
As huge quantities of documents have become available, services using natural language processing technologies trained by huge corpora have emerged, such as information retrieval ...
Hitoshi Isahara, Masao Utiyama, Eiko Yamamoto, Aki...
NPAR
2010
ACM
14 years 13 days ago
Sisley the abstract painter
We present an interactive abstract painting system named Sisley. Sisley works upon the psychological principle [Berlyne 1971] that abstract arts are often characterized by their gr...
Mingtian Zhao, Song Chun Zhu
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 6 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...