Sciweavers

1937 search results - page 179 / 388
» Rule Based Updates on Simple Knowledge Bases
Sort
View
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 10 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
SAS
2001
Springer
117views Formal Methods» more  SAS 2001»
15 years 9 months ago
Finite-Tree Analysis for Constraint Logic-Based Languages
Abstract. Logic languages based on the theory of rational, possibly infinite, trees have much appeal in that rational trees allow for faster unification (due to the omission of t...
Roberto Bagnara, Roberta Gori, Patricia M. Hill, E...
CORR
2008
Springer
99views Education» more  CORR 2008»
15 years 4 months ago
A Model-Based Frequency Constraint for Mining Associations from Transaction Data
Mining frequent itemsets is a popular method for finding associated items in databases. For this method, support, the co-occurrence frequency of the items which form an associatio...
Michael Hahsler
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 11 months ago
Power Allocation Based on SEP Minimization in Two-Hop Decode-and-Forward Relay Networks
—The problem of optimal power allocation among the relays in a two-hop decode-and-forward cooperative relay network with independent Rayleigh fading channels is considered. It is...
Arash Khabbazibasmenj, Sergiy A. Vorobyov
CVPR
2011
IEEE
14 years 11 months ago
Global Contrast based Salient Region Detection
Reliable estimation of visual saliency allows appropriate processing of images without prior knowledge of their content, and thus remains an important step in many computer vision ...
Ming-Ming Cheng, Guo-Xin Zhang, Niloy J. Mitra, Xi...