Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
: A large amount of computing literature has become available over the Internet, as university departments and research institutions have made their technical reports, preprints, a...
Ian H. Witten, Sally Jo Cunningham, Mahendra Valla...
This paper describes the construction and initial usage of a digital library collection of historical newspapers written in the Maori language. The newspapers (Niupepa in Maori) t...
Te Taka Keegan, Mark D. Apperley, Sally Jo Cunning...
One of the principal advantages of parallelizing a rule-based system, or more generally, any A.I. system, is the ability to pursue alternate search paths concurrently. Conventiona...
Two approaches are proposed for the design of tied-mixture hidden Markov models (TMHMM). One approach improves parameter sharing via partial tying of TMHMM states. To facilitate ty...