Sciweavers

2889 search results - page 478 / 578
» Querying Structured Hyperdocuments
Sort
View
APSEC
2003
IEEE
14 years 1 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
EUROCRYPT
2010
Springer
14 years 25 days ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
VLDB
1999
ACM
118views Database» more  VLDB 1999»
14 years 9 days ago
Similarity Search in High Dimensions via Hashing
The nearest- or near-neighbor query problems arise in a large variety of database applications, usually in the context of similarity searching. Of late, there has been increasing ...
Aristides Gionis, Piotr Indyk, Rajeev Motwani
VLDB
1999
ACM
151views Database» more  VLDB 1999»
14 years 9 days ago
Cache Conscious Indexing for Decision-Support in Main Memory
As random access memory gets cheaper, it becomes increasingly affordable to build computers with large main memories. We consider decision support workloads within the context of...
Jun Rao, Kenneth A. Ross
ANZIIS
1996
IEEE
14 years 6 days ago
An object oriented intelligent tourist advisor system
This paper describes the design and developmentof an expert system for tourist information center. The expert system was built to recommend a suitable travel schedule that satisfi...
C. H. K. Tsang, M. H. C. Woo, C. Bloor