Sciweavers

1691 search results - page 322 / 339
» Restricted subset selection
Sort
View
PVLDB
2010
122views more  PVLDB 2010»
15 years 29 days ago
On Graph Query Optimization in Large Networks
The dramatic proliferation of sophisticated networks has resulted in a growing need for supporting effective querying and mining methods over such large-scale graph-structured da...
Peixiang Zhao, Jiawei Han
142
Voted
SCN
2010
Springer
187views Communications» more  SCN 2010»
15 years 28 days ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
124
Voted
ACSAC
2010
IEEE
15 years 18 days ago
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, trad...
An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang
147
Voted
ISDA
2010
IEEE
15 years 14 days ago
Avoiding simplification strategies by introducing multi-objectiveness in real world problems
Abstract--In business analysis, models are sometimes oversimplified. We pragmatically approach many problems with a single financial objective and include monetary values for non-m...
Charlotte J. C. Rietveld, Gijs P. Hendrix, Frank T...
126
Voted

Publication
468views
14 years 11 months ago
Visual object tracking via sample-based Adaptive Sparse Representation (AdaSR)
When appearance variation of object and its background, partial occlusion or deterioration in object images occurs, most existing visual tracking methods tend to fail in tracking ...
Zhenjun Han, Jianbin Jiao, Baochang Zhang, Qixiang...