Showing 1 - 5 of 5
scheme for traitor tracing from lattice, and the scheme is almost as efficient as the learning with errors (LWE) encryption …, a comparative analysis shows that the parameters of the scheme such as lattice dimension, trapdoor size, and ciphertext …
Persistent link: https://www.econbiz.de/10012043981
approach using forward references to give better materialized view selection. The approach works on lattice framework of data …
Persistent link: https://www.econbiz.de/10012045543
without enlisting the talents of the original developers or vendor. In fact, automatic matching tools help users to facilitate … novel approach which consists in building a semantic mashup using a matching tool, domain ontology and a set of patterns to …
Persistent link: https://www.econbiz.de/10012046092
determine the nature of the objects, the authors make the detection of the contours of the foreground image, then by matching … is carried out in real time, the matching of the images takes a considerable time and this time becomes increasingly …
Persistent link: https://www.econbiz.de/10012047244
and linguistic matching techniques and methods, based on the relevant attributes per different points of syntactic and … structural technic. (iii) The post-alignment phase which optimizes the matching by a hybrid technique of continuous NSGA-II and …
Persistent link: https://www.econbiz.de/10012049007