Sciweavers

1656 search results - page 178 / 332
» Labeling Schemes with Queries
Sort
View
ASIACRYPT
2007
Springer
14 years 2 months ago
Bounded CCA2-Secure Encryption
Abstract. Whereas encryption schemes withstanding passive chosenplaintext attacks (CPA) can be constructed based on a variety of computational assumptions, only a few assumptions a...
Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, ...
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
14 years 26 days ago
Indexing multi-dimensional data in a cloud system
Providing scalable database services is an essential requirement for extending many existing applications of the Cloud platform. Due to the diversity of applications, database ser...
Jinbao Wang, Sai Wu, Hong Gao, Jianzhong Li, Beng ...
FOSSACS
2009
Springer
14 years 2 months ago
Separating Graph Logic from MSO
Abstract. Graph logic (GL) is a spatial logic for querying graphs introduced by Cardelli et al. It has been observed that in terms of expressive power, this logic is a fragment of ...
Timos Antonopoulos, Anuj Dawar
ICARCV
2008
IEEE
184views Robotics» more  ICARCV 2008»
14 years 2 months ago
Learning informative point classes for the acquisition of object model maps
—This paper proposes a set of methods for building informative and robust feature point representations, used for accurately labeling points in a 3D point cloud, based on the typ...
Radu Bogdan Rusu, Zoltan Csaba Marton, Nico Blodow...
DASFAA
2007
IEEE
173views Database» more  DASFAA 2007»
14 years 2 months ago
Towards Adaptive Information Merging Using Selected XML Fragments
As XML information proliferates on the Web, searching XML information via a search engine is crucial to the experience of both casual and experienced Web users. The returned XML fr...
Ho Lam Lau, Wilfred Ng