Sciweavers

1047 search results - page 125 / 210
» Searching Without a Heuristic: Efficient Use of Abstraction
Sort
View
ASIACRYPT
2010
Springer
13 years 6 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
CAV
2010
Springer
225views Hardware» more  CAV 2010»
13 years 12 months ago
Merit: An Interpolating Model-Checker
Abstract. We present the tool MERIT, a CEGAR model-checker for safety propf counter-systems, which sits in the Lazy Abstraction with Interpolants (LAWI) framework. LAWI is parametr...
Nicolas Caniart
ICMCS
2009
IEEE
151views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Anonymous Biometric Access Control based on homomorphic encryption
In this paper, we consider the problem of incorporating privacy protection in a biometric access control system. An Anonymous Biometric Access Control (ABAC) system is proposed to...
Ying Luo, Sen-Ching S. Cheung, Shuiming Ye
APSCC
2007
IEEE
14 years 2 months ago
An Agent Scheduling Optimization for Call Centers
A suitable assignment of agents to handle the workload at a call center is not easy to fulfill because it requires a combinatorial optimization with large solution space and the n...
Chiaki Hishinuma, Masaaki Kanakubo, Takuma Goto
GECCO
2006
Springer
220views Optimization» more  GECCO 2006»
13 years 11 months ago
A comparative study of immune system based genetic algorithms in dynamic environments
Diversity and memory are two major mechanisms used in biology to keep the adaptability of organisms in the everchanging environment in nature. These mechanisms can be integrated i...
Shengxiang Yang