Sciweavers

402 search results - page 77 / 81
» Cryptosystems using Linear Groups
Sort
View
SCN
2010
Springer
187views Communications» more  SCN 2010»
14 years 11 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
113
Voted
KDD
2006
ACM
145views Data Mining» more  KDD 2006»
16 years 1 months ago
Deriving quantitative models for correlation clusters
Correlation clustering aims at grouping the data set into correlation clusters such that the objects in the same cluster exhibit a certain density and are all associated to a comm...
Arthur Zimek, Christian Böhm, Elke Achtert, H...
SODA
2010
ACM
146views Algorithms» more  SODA 2010»
15 years 10 months ago
Classified Stable Matching
We introduce the classified stable matching problem, a problem motivated by academic hiring. Suppose that a number of institutes are hiring faculty members from a pool of applican...
Chien-Chung Huang
110
Voted
IROS
2008
IEEE
104views Robotics» more  IROS 2008»
15 years 7 months ago
Generalizing metamodules to simplify planning in modular robotic systems
— In this paper we develop a theory of metamodules and an associated distributed asynchronous planner which generalizes previous work on metamodules for lattice-based modular rob...
Daniel J. Dewey, Michael P. Ashley-Rollman, Michae...
104
Voted
ATAL
2006
Springer
15 years 4 months ago
Resource allocation among agents with preferences induced by factored MDPs
Distributing scarce resources among agents in a way that maximizes the social welfare of the group is a computationally hard problem when the value of a resource bundle is not lin...
Dmitri A. Dolgov, Edmund H. Durfee