60,931 Hits in 1.8 sec

Hierarchical Random Graph Model for Off-line Handwritten Signatures Recognition

Marcin Piekarczyk
2010 2010 International Conference on Complex, Intelligent and Software Intensive Systems  
For the purposes of representing the analysed handwritten signatures, new hierarchical (two-layer) HIE graph structures based on IE graphs have been defined.  ...  The usage of attributed graphs enables the storage of additional semantic information describing the properties of individual signature strokes.  ...  It is constructed as a metastructure structured over the set base graph (the IE graph in the present case) in such a way that the nodes of the hierarchical graph are subgraphs of the base graph [Oleksik  ... 
doi:10.1109/cisis.2010.132 dblp:conf/cisis/Piekarczyk10 fatcat:bukwandyxfatvpimh2dbee34li

Power Conserving and Access Efficient Indexes for Wireless Computing [chapter]

Dik Lun Lee, Qinglong Hu, Wang-Chien Lee
2000 Information Organization and Databases  
Among them, hybrid index is the best choice for improving power efficiency under both scenarios of single and multiple attributes based queries.  ...  Moreover, we introduce two access efficient indexing methods, cache schedule and integrated signature, for a wireless data dissemination system that incorporates both of broadcast and on-demand services  ...  MULTI-ATTRIBUTE INDEXES So far the index techniques considered are based on one attribute and can handle single-attribute based queries.  ... 
doi:10.1007/978-1-4615-1379-7_18 fatcat:3dqlxlgggzgqrpkvirrlsu7p3e

Hierarchical Bitmap Index: An Efficient and Scalable Indexing Technique for Set-Valued Attributes [chapter]

Mikołaj Morzy, Tadeusz Morzy, Alexandros Nanopoulos, Yannis Manolopoulos
2003 Lecture Notes in Computer Science  
In this paper we present the hierarchical bitmap index-a novel technique for indexing set-valued attributes.  ...  Existing techniques for indexing set-valued attributes (e.g., inverted files, signature indexes or RD-trees) are not efficient enough to support fast access of set-valued data in very large databases.  ...  Hierarchical Bitmap Index Hierarchical bitmap index is based on signature index framework.  ... 
doi:10.1007/978-3-540-39403-7_19 fatcat:w4rzniomofh7bdix4grdf53yh4

Query Optimization in Object Oriented Databases Based on SD-Tree and n-ary Tree

Tran Minh Bao, Truong Cong Tuan
2016 EAI Endorsed Transactions on Context-aware Systems and Applications  
Index structure arranges signatures according to hierarchical clustering for improving assessment of query.  ...  This method is based on technique of using signature file and SD-Tree and signature files are organized according to decentralization to filter unsuitable data quickly and each signature file is saved  ...  Base on theory and suggested algorithms, this paper proposes an approach which combines signature file hierarchy with SD-Tree as follows: (1) all of signature files are organized in hierarchical structure  ... 
doi:10.4108/eai.9-3-2016.151114 fatcat:ob7ueoimrvbd5hclyo45tj7qga

An Improved Security enabled Distribution of Protected Cloud Storage Services by Zero-Knowledge Proof based on RSA Assumption

M. Sowmyavarshini, D. Palanikkumar, G. Rathi
2012 International Journal of Computer Applications  
In hierarchical identity-based architecture, the sender needs to encrypt a file only once and store only one copy of the corresponding ciphertext in a cloud.  ...  In this hierarchical architecture, the root PKG generates the system parameters for the hierarchical identity based encryption system by D.  ...  Fig 1 : 1 Hierarchical Identity Based Architecture ciphertext and private key as well as time needed for decryption grows linearly based on the depth of the hierarchy.  ... 
doi:10.5120/4952-7198 fatcat:kuq73tbq4jg27nqprduiaih4p4

An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption

Palanikkumar D
2012 Bonfring International Journal of Research in Communication Engineering  
Based on the RSA signature, a Trapdoor Commitment scheme is proposed to improve the security level.  ...  An efficient sharing of secure cloud storage services (ESC) scheme allows the users to share the messages in hierarchical order.  ...  Multiauthority attribute-based encryption enables a more realistic deployment of attribute-based access control, such that different authorities are responsible for issuing different sets of attributes  ... 
doi:10.9756/bijrce.1504 fatcat:naghlqgk3vblxaiuzq537mw23i

Learning Semantic Signatures for 3D Object Retrieval

Boqing Gong, Jianzhuang Liu, Xiaogang Wang, Xiaoou Tang
2013 IEEE transactions on multimedia  
We convert such qualitative descriptions into attribute signature (AS) and reference set signature (RSS), respectively, and use them for 3DOR.  ...  Index Terms-3D object retrieval, semantic signature, attribute, reference set, user-friendly interface.  ...  Learning Reference Set Signature In this section, we define our second semantic signature RSS based on a reference set, and then extend it to a hierarchical structure. 1) Reference Set Signature (RSS  ... 
doi:10.1109/tmm.2012.2231059 fatcat:xy2hnq72jvg67jiktirzgoi3sa

Study on traffic classification taxonomy for multilateral and hierarchical traffic classification

Ji-hye Kim, Sung-Ho Yoon, Myung-Sup Kim
2012 2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)  
The proposed taxonomy can support multilateral identification based on the proposed four classification criteria: service, application, protocol, and function.  ...  In this paper, we propose novel traffic classification taxonomy for multilateral and hierarchical traffic identification.  ...  Also we have proved it is possible to classify based on the proposed four criteria and to use the classification results effectively by roll-up and drill-down of hierarchical attributes.  ... 
doi:10.1109/apnoms.2012.6356105 dblp:conf/apnoms/KimYK12 fatcat:mebdqrhx2vbj3m4m6j2bbqicsq

Querying Object-Oriented Databases Based on Signature Graph and n-ary Tree

Tran Minh Bao, Truong Cong Tuan, Huynh Trong Duc
2016 EAI Endorsed Transactions on Context-aware Systems and Applications  
Main idea is a signature graph structure, created based on signature file, created for a layer and signature files are arranged as a hierarchical system according to nested structure of layers.  ...  It's based on a signature graph and n-ary tree helping to query related information when there is no correct match.  ...  So therefore hierarchical tree helps for searching almost identical match.  ... 
doi:10.4108/eai.12-2-2016.151087 fatcat:pt6pe2owfzakjlrg2ewmlgk5em

Feature Engineering Techniques to Improve Identification Accuracy for Offline Signature Case-Bases

Shisna Sanyal, Anindta Desarkar, Uttam Kumar Das, Chitrita Chaudhuri
2021 International Journal of Rough Sets and Data Analysis  
Search space reduction possibilities within the case base are probed on a few selected key features, applying Hierarchical clustering and Dendogram representation.  ...  The raw images and their extracted features are preserved using Case Based Reasoning and Feature Engineering principles.  ...  On a trial basis, we at first utilized a hierarchical clustering technique based on dendrograms to partition the signature case-base into smaller units to facilitate faster identification.  ... 
doi:10.4018/ijrsda.20210101.oa1 fatcat:occrthn3c5batkovs77sdsrohi

Similarity Measures for Enhancing Interactive Streamline Seeding

T. McLoughlin, M. W. Jones, R. S. Laramee, R. Malki, I. Masters, C. D. Hansen
2013 IEEE Transactions on Visualization and Computer Graphics  
We introduce the novel idea of computing streamline signatures based on a set of curve-based attributes. A signature produces a compact representation for describing a streamline.  ...  We demonstrate that this novel scheme, including a hierarchical variant, produces good clustering results and is computed over two orders of magnitude faster than previous methods.  ...  Streamline signatures are then computed based upon streamline attributes. The streamline signatures are used to order the streamlines based on similarity.  ... 
doi:10.1109/tvcg.2012.150 pmid:23744264 fatcat:mq7vavr56fchzg6qnb4hednnqi


2013 Graduate Research in Engineering and Technology  
Number of schemes has been proposed to achieve the access control of outsourced data like hierarchical attribute set based encryption [HASBE] by extending cipher-text-policy attribute set based encryption  ...  Hierarchical attribute set based encryption [HASBE] scheme seamlessly extends the attribute set based encryption [ASBE] scheme to handle the hierarchical structure of system users.  ...  Hierarchical attribute set based encryption [HASBE] scheme seamlessly extends the attribute set based encryption [ASBE] scheme to handle the hierarchical structure of system users.  ... 
doi:10.47893/gret.2013.1019 fatcat:2xx2nrdsbncu7e33pmhyz26coq

ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities

Runnan Zhang, Gang Liu, Shancang Li, Yongheng Wei, Quan Wang, Qi Li
2021 Security and Communication Networks  
The ABAC with anonymous access proposed in this paper called ABSAC strengthens the identity-less of ABAC by combining homomorphic attribute-based signatures (HABSs) which does not send the subject attributes  ...  Many attribute-based access control (ABAC) models that support anonymous access expose the attributes of the subject to the authorization organization during the authorization process, which allows the  ...  private key of the hierarchical attribute.  ... 
doi:10.1155/2021/5531369 fatcat:hyddnj256faqbmxs7ix4cvlan4

SPROUT: Lazy vs. Eager Query Plans for Tuple-Independent Probabilistic Databases

Dan Olteanu, Jiewen Huang, Christoph Koch
2009 Proceedings / International Conference on Data Engineering  
The signature s of our operator is computed based on the query signature and the probability computation operators in the subplan P ′ rooted at n.  ...  In contrast, Q ′ is non-hierarchical, because each of the two join attributes of Ord participates in a different join.  ... 
doi:10.1109/icde.2009.123 dblp:conf/icde/OlteanuHK09 fatcat:ugmgyznj4zcjfncowhal47pccm

Security and privacy in cloud computing

Rajat Soni, Smrutee Ambalkar, Pratosh Bansal
2016 2016 Symposium on Colossal Data Analysis and Networking (CDAN)  
Proposed ASP protocol also includes a new digital signature scheme that enables cloud providers to ensure that requests are submitted by authorized end-users, without learning their identities.  ...  Proposed ASP (Advanced Security Protocol) protocol is a cryptographic access control protocol based on key-updating scheme referred to as Advanced Key Update (AKU).  ...  Based on the key-policy attribute-based encryption (KP-ABE), combined with the idea of hierarchical ID-Based encryption (HIBE), a hierarchical authority key-policy attribute-based encryption (HA-KP-ABE  ... 
doi:10.1109/cdan.2016.7570962 fatcat:g5mwhulgjnbg5ppfo6syqs5ieu
« Previous Showing results 1 — 15 out of 60,931 results