Sciweavers

390 search results - page 17 / 78
» Virtual Attribute Subsetting
Sort
View
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
13 years 7 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
BIBM
2009
IEEE
164views Bioinformatics» more  BIBM 2009»
14 years 2 months ago
Differential Predictive Modeling for Racial Disparities in Breast Cancer
The primary objective of disparities research is to model the differences across multiple groups and identify the groups that behave significantly different from each other. Indep...
Indranil Palit, Chandan K. Reddy, Kendra L. Schwar...
FLAIRS
2004
13 years 11 months ago
Generating Tailored, Comparative Descriptions in Spoken Dialogue
We describe an approach to presenting information in spoken dialogues that for the first time brings together multi-attribute decision models, strategic content planning, state-of...
Johanna D. Moore, Mary Ellen Foster, Oliver Lemon,...
WEA
2004
Springer
129views Algorithms» more  WEA 2004»
14 years 3 months ago
Experimental Comparison of Greedy Randomized Adaptive Search Procedures for the Maximum Diversity Problem
Abstract. The maximum diversity problem (MDP) consists of identifying optimally diverse subsets of elements from some larger collection. The selection of elements is based on the d...
Geiza C. Silva, Luiz Satoru Ochi, Simone L. Martin...
DEXA
2000
Springer
102views Database» more  DEXA 2000»
14 years 2 months ago
Extending the Re-use of Query Results at Remote Client Sites
In 'Associative Caching' each client computer keeps a copy of its query result sets in its own local database. The purpose is to reduce the size and frequency of queries ...
Jerome Robinson, Barry G. T. Lowden