Sciweavers

27 search results - page 3 / 6
» Similarity issues in attribute implications from data with f...
Sort
View
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
13 years 6 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
FGCS
2011
123views more  FGCS 2011»
13 years 3 months ago
Mapping attribution metadata to the Open Provenance Model
A description of a data item’s provenance can be provided in different forms, and which form is best depends on the intended use of that description. Because of this, differen...
Simon Miles
IJACTAICIT
2010
200views more  IJACTAICIT 2010»
13 years 6 months ago
An Intelligent Framework for Natural Object Identification in Images
Human superiority over computers in identifying natural objects like clouds, water, grass etc. comes from two capabilities: the capability to maintain a growing knowledge base per...
Aasia Khanum
EUROCRYPT
2011
Springer
13 years 7 days ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters
CLA
2007
13 years 10 months ago
Representing Numeric Values in Concept Lattices
Formal Concept Analysis is based on the occurrence of symbolic attributes in individual objects, or observations. But, when the attribute is numeric, treatment has been awkward. In...
John L. Pfaltz