Sciweavers

505 search results - page 54 / 101
» Universal Constructions for Large Objects
Sort
View
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
15 years 10 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
DL
1995
Springer
120views Digital Library» more  DL 1995»
15 years 7 months ago
A New Zealand Digital Library for Computer Science Research
: A large amount of computing literature has become available over the Internet, as university departments and research institutions have made their technical reports, preprints, a...
Ian H. Witten, Sally Jo Cunningham, Mahendra Valla...
ICHIM
2001
94views more  ICHIM 2001»
15 years 5 months ago
The Niupepa Collection: Opening the Blinds on a Window to the Past
This paper describes the construction and initial usage of a digital library collection of historical newspapers written in the Maori language. The newspapers (Niupepa in Maori) t...
Te Taka Keegan, Mark D. Apperley, Sally Jo Cunning...
DAGSTUHL
1990
15 years 5 months ago
Parallel Rule-Firing Production Systems
One of the principal advantages of parallelizing a rule-based system, or more generally, any A.I. system, is the ability to pursue alternate search paths concurrently. Conventiona...
Daniel Neimann
TASLP
2002
84views more  TASLP 2002»
15 years 3 months ago
Substate tying with combined parameter training and reduction in tied-mixture HMM design
Two approaches are proposed for the design of tied-mixture hidden Markov models (TMHMM). One approach improves parameter sharing via partial tying of TMHMM states. To facilitate ty...
Liang Gu, Kenneth Rose