Sciweavers

53 search results - page 9 / 11
» Practical methods for constructing suffix trees
Sort
View
EUROCRYPT
2004
Springer
14 years 15 days ago
Chosen-Ciphertext Security from Identity-Based Encryption
Abstract. We propose a simple and efficient construction of a CCAsecure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme. Our construction re...
Ran Canetti, Shai Halevi, Jonathan Katz
ICEIS
2009
IEEE
14 years 1 months ago
Semi-supervised Information Extraction from Variable-length Web-page Lists
We propose two methods for constructing automated programs for extraction of information from a class of web pages that are very common and of high practical significance - varia...
Daniel Nikovski, Alan Esenther, Akihiro Baba
IJCNN
2007
IEEE
14 years 1 months ago
Branching Principal Components: Elastic Graphs, Topological Grammars and Metro Maps
— To approximate complex data, we propose new type of low-dimensional “principal object”: principal cubic complex. This complex is a generalization of linear and nonlinear pr...
Alexander N. Gorban, Neil R. Sumner, Andrei Yu. Zi...
ICLP
2007
Springer
14 years 1 months ago
Automatic Correctness Proofs for Logic Program Transformations
Abstract. The many approaches which have been proposed in the literature for proving the correctness of unfold/fold program transformations, consist in associating suitable well-fo...
Alberto Pettorossi, Maurizio Proietti, Valerio Sen...
TCSV
2008
297views more  TCSV 2008»
13 years 7 months ago
Activity Analysis, Summarization, and Visualization for Indoor Human Activity Monitoring
Abstract--In this work, we study how continuous video monitoring and intelligent video processing can be used in eldercare to assist the independent living of elders and to improve...
Zhongna Zhou, Xi Chen, Yu-Chia Chung, Zhihai He, T...