Sciweavers

341 search results - page 66 / 69
» Learning to satisfy
Sort
View
ACNS
2004
Springer
220views Cryptology» more  ACNS 2004»
14 years 2 months ago
Secure Conjunctive Keyword Search over Encrypted Data
Abstract. We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterio...
Philippe Golle, Jessica Staddon, Brent R. Waters
OTM
2004
Springer
14 years 1 months ago
A Virtual-Machine-Based Middleware
Currently, a number of distributed software systems development tools exist, but typically they are designed either to satisfy industrial standards – industrial perspective – o...
Alcides Calsavara, Agnaldo K. Noda, Juarez da Cost...
CEEMAS
2001
Springer
14 years 1 months ago
UML for Behavior-Oriented Multi-agent Simulations
Developing multi-agent simulations seems to be rather straight forward, as active entities in the original correspond to active agents in the model. Thus plausible behaviors can be...
Christoph Oechslein, Franziska Klügl, Rainer ...
ASIACRYPT
2000
Springer
14 years 28 days ago
Towards Signature-Only Signature Schemes
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Adam Young, Moti Yung
DASFAA
2004
IEEE
135views Database» more  DASFAA 2004»
14 years 9 days ago
Semi-supervised Text Classification Using Partitioned EM
Text classification using a small labeled set and a large unlabeled data is seen as a promising technique to reduce the labor-intensive and time consuming effort of labeling traini...
Gao Cong, Wee Sun Lee, Haoran Wu, Bing Liu