A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
In order to improve the two-level signature file method designed by Sacks-Davis et al. , we propose new multikey access methods based on term discrimination and signature clustering. ... By term discrimination, we create separate, efficient access methods for the terms frequently used in user queries. ... First we present a brief overview of the signature file method. In section 3 we propose new, efficient multikey access methods based on term discrimination and record signature clustering. ...doi:10.1145/75335.75353 fatcat:gofcyqw2ujb7vis7zshrei6otm
Yao et.al based on Credential based Public Key Cryptography (AC-PKC) schema. Two-level verification is enforced with signature generation and access controls using fuzzy techniques  . ... Authorization: It is used to allow the user to access the content which is permitted and block the other accesses based on conditions. ... He has many publications in well renowned International journals and Conferences. ...doi:10.1109/access.2021.3057766 fatcat:adrf6tuayfagjnwfztzkozf64y
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination. ... The Subject Index contains entries describing the item under all appropriate subject headings, plus the first author's name, the publication abbreviation, month, and year, and inclusive pages. ... Term Load Forecasting Method of Smart Grid Using MLR and LSTM Neural Network. ...doi:10.1109/tii.2021.3138206 fatcat:ulsazxgmpfdmlivigjqgyl7zre
Resolution measurements have only been made on the DPI and one other eye tracker. We do not know resolution values for the most used eye trackers. ... His research focuses on how the dynamics of language-related, perceptual, and oculomotor processes subserve attentional control, using reading, spatial attention, and working memory tasks as experimental ... and unfiltered) during a fixation task. ...doi:10.16910/jemr.11.5.1 pmid:33828710 pmcid:PMC7905738 fatcat:qs5svkolpzhjpltzmbayfx6x3i
Using multikey based visual representations, we outperform state of the art CNN-representations, yet equalizing ensembles that also work on multikey-based vectors. ... We show that different models and architectures have only little influence on the detection performance. ... Félix Iglesias, who shared his expertise, insight and ideas with me. Your help during the thesis was invaluable for me and withouth it I could not have finished the thesis. ...doi:10.34726/hss.2022.89762 fatcat:ioxgqcq6sbgwhfqcr36tew2ea4