Sciweavers

15375 search results - page 244 / 3075
» cans 2008
Sort
View
ICISC
2008
165views Cryptology» more  ICISC 2008»
13 years 9 months ago
Distributed Attribute-Based Encryption
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy, specified as a logical combination of attributes. Such ciphertexts can be decry...
Sascha Müller 0003, Stefan Katzenbeisser, Cla...
ICMLA
2008
13 years 9 months ago
Farthest Centroids Divisive Clustering
A method is presented to partition a given set of data entries embedded in Euclidean space by recursively bisecting clusters into smaller ones. The initial set is subdivided into ...
Haw-ren Fang, Yousef Saad
ICWSM
2008
13 years 9 months ago
Logsonomy: A Search Engine Folksonomy
In social bookmarking systems users describe bookmarks by keywords called tags. The structure behind these social systems, called folksonomies, can be viewed as a tripartite hyper...
Robert Jäschke, Beate Krause, Andreas Hotho, ...
IFIP12
2008
13 years 9 months ago
A Study with Class Imbalance and Random Sampling for a Decision Tree Learning System
Sampling methods are a direct approach to tackle the problem of class imbalance. These methods sample a data set in order to alter the class distributions. Usually these methods ar...
Ronaldo C. Prati, Gustavo E. A. P. A. Batista, Mar...
JURIX
2008
13 years 9 months ago
About the logical relations between cases and rules
The two main types of law are legislation and precedents. Both types have a corresponding reasoning pattern determining legal consequences: legislation can be applied and precedent...
Bart Verheij