{"title":"Chinese Latent Relational Search Based on Relational Similarity","authors":"Chao Liang, Zhao Lu","doi":"10.1007/978-3-642-34679-8_12","DOIUrl":"https://doi.org/10.1007/978-3-642-34679-8_12","url":null,"abstract":"","PeriodicalId":335836,"journal":{"name":"International Conference on Data and Knowledge Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116736023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model of User-Oriented Reduct Construction Based on Minimal Set Cover","authors":"Suqing Han, Guimei Yin","doi":"10.1007/978-3-642-34679-8_10","DOIUrl":"https://doi.org/10.1007/978-3-642-34679-8_10","url":null,"abstract":"","PeriodicalId":335836,"journal":{"name":"International Conference on Data and Knowledge Engineering","volume":"94 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133016887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Combination of Feature Weight Learning and Classification Based on Local Approximation","authors":"Hongmin Cai, M. Ng","doi":"10.1007/978-3-642-34679-8_9","DOIUrl":"https://doi.org/10.1007/978-3-642-34679-8_9","url":null,"abstract":"","PeriodicalId":335836,"journal":{"name":"International Conference on Data and Knowledge Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Du, Jiguo Li, Yichen Zhang, Tao Li, Yuexin Zhang
{"title":"Certificate-Based Key-Insulated Signature","authors":"H. Du, Jiguo Li, Yichen Zhang, Tao Li, Yuexin Zhang","doi":"10.1007/978-3-642-34679-8_19","DOIUrl":"https://doi.org/10.1007/978-3-642-34679-8_19","url":null,"abstract":"","PeriodicalId":335836,"journal":{"name":"International Conference on Data and Knowledge Engineering","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115732955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure and Efficient Mix Network Especially Suitable for E-Voting","authors":"Kun Peng","doi":"10.1007/978-3-642-34679-8_16","DOIUrl":"https://doi.org/10.1007/978-3-642-34679-8_16","url":null,"abstract":"","PeriodicalId":335836,"journal":{"name":"International Conference on Data and Knowledge Engineering","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eman El-Dawy, Hoda M. O. Mokhtar, A. El-Bastawissy
{"title":"Directional Skyline Queries","authors":"Eman El-Dawy, Hoda M. O. Mokhtar, A. El-Bastawissy","doi":"10.1007/978-3-642-34679-8_2","DOIUrl":"https://doi.org/10.1007/978-3-642-34679-8_2","url":null,"abstract":"","PeriodicalId":335836,"journal":{"name":"International Conference on Data and Knowledge Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130015835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weaknesses of \"Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol\"","authors":"M. Khan, D. He","doi":"10.1007/978-3-642-34679-8_22","DOIUrl":"https://doi.org/10.1007/978-3-642-34679-8_22","url":null,"abstract":"","PeriodicalId":335836,"journal":{"name":"International Conference on Data and Knowledge Engineering","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132086525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PEVS: A Secure Electronic Voting Scheme Using Polling Booths","authors":"Md. Abdul Based, Joe-Kai Tsay, S. F. Mjølsnes","doi":"10.1007/978-3-642-34679-8_18","DOIUrl":"https://doi.org/10.1007/978-3-642-34679-8_18","url":null,"abstract":"","PeriodicalId":335836,"journal":{"name":"International Conference on Data and Knowledge Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114124595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Self-stabilizing Algorithm for Finding a Minimal K-Dominating Set in General Networks","authors":"Guangyuan Wang, Hua Wang, Xiaohui Tao, Ji Zhang","doi":"10.1007/978-3-642-34679-8_8","DOIUrl":"https://doi.org/10.1007/978-3-642-34679-8_8","url":null,"abstract":"","PeriodicalId":335836,"journal":{"name":"International Conference on Data and Knowledge Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124741532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transforming Nescient Activity into Intelligent Activity","authors":"R. Haque, Nenad B. Krdzavac, T. Butler","doi":"10.1007/978-3-642-34679-8_3","DOIUrl":"https://doi.org/10.1007/978-3-642-34679-8_3","url":null,"abstract":"","PeriodicalId":335836,"journal":{"name":"International Conference on Data and Knowledge Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116089721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}