Sciweavers

2648 search results - page 452 / 530
» Worlds, Models, and KM
Sort
View
ICICS
2010
Springer
13 years 8 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
UIST
2010
ACM
13 years 7 months ago
Gesture search: a tool for fast mobile data access
Modern mobile phones can store a large amount of data, such as contacts, applications and music. However, it is difficult to access specific data items via existing mobile user in...
Yang Li
EUSFLAT
2009
13 years 7 months ago
A Two Step Solution Procedure to a Fuzzy Medical Waste Disposal Facility Location Problem
This paper handles the medical waste disposal facility location problem in Istanbul by using fuzzy TOPSIS (FETOPSIS) to select the adequate place between some candidate points that...
H. Ziya Ulukan, Yesim Kop
ICMLA
2009
13 years 7 months ago
Discovering Rules from Disk Events for Predicting Hard Drive Failures
Detecting impending failure of hard disks is an important prediction task which might help computer systems to prevent loss of data and performance degradation. Currently most of t...
Vipul Agarwal, Chiranjib Bhattacharyya, Thirumale ...
ICOODB
2009
94views Database» more  ICOODB 2009»
13 years 7 months ago
Metamodelling with Datalog and Classes: ConceptBase at the Age of 21
ConceptBase is a deductive object-oriented database system intended for the management of metadata. A distinguishing feature of the Telos language underlying ConceptBase is the abi...
Matthias Jarke, Manfred A. Jeusfeld, Hans W. Nisse...