UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 3,516
1.
  • A Traceable and Revocable C... A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection
    Han, Dezhi; Pan, Nannan; Li, Kuan-Ching IEEE transactions on dependable and secure computing, 2022-Jan.-Feb.-1, 2022-1-1, 20220101, Volume: 19, Issue: 1
    Journal Article

    Considered as a promising fine-grained access control mechanism for data sharing without a centralized trusted third-party, the access policy in a plaintext form may reveal sensitive information in ...
Full text
2.
  • Separable and Reversible Da... Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling
    Yi, Shuang; Zhou, Yicong IEEE transactions on multimedia, 2019-Jan., 2019-1-00, 20190101, Volume: 21, Issue: 1
    Journal Article
    Peer reviewed

    This paper first introduces a parametric binary tree labeling scheme (PBTL) to label image pixels in two different categories. Using PBTL, a data embedding method (PBTL-DE) is proposed to embed ...
Full text
3.
  • An Improved Reversible Data... An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling
    Wu, Youqing; Xiang, Youzhi; Guo, Yutang ... IEEE transactions on multimedia, 2020-Aug., 2020-8-00, Volume: 22, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    This work proposes an improved reversible data hiding scheme in encrypted images using parametric binary tree labeling(IPBTL-RDHEI), which takes advantage of the spatial correlation in the entire ...
Full text

PDF
4.
  • Holonomic equations and efficient random generation of binary trees
    Pierre Lescanne Discrete mathematics and theoretical computer science, 02/2024, Volume: 25:2
    Journal Article
    Peer reviewed
    Open access

    Holonomic equations are recursive equations which allow computing efficiently numbers of combinatoric objects. Rémy showed that the holonomic equation associated with binary trees yields an efficient ...
Full text
5.
  • The Mathematical Analysis a... The Mathematical Analysis and Classification Research of an Iris Data Set Using Binary Tree and Grey Relation Grade
    Feng, Chiang Ling Journal of physics. Conference series, 10/2021, Volume: 2068, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Abstract The data from an Iris flower database is studied. The Iris database is the most commonly used database for machine learning algorithms. The Iris database was developed by Ronald Aylmer ...
Full text

PDF
6.
  • Ranked Keyword Search Over ... Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method
    Miao, Yinbin; Zheng, Wei; Jia, Xiaohua ... IEEE transactions on services computing, 01/2023, Volume: 16, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Ranked keyword search over encrypted data has been extensively studied in cloud computing as it enables data users to find the most relevant results quickly. However, existing ranked multi-keyword ...
Full text
7.
  • Time-varying Graph and Bina... Time-varying Graph and Binary Tree Search Based Routing Algorithm for LEO Satellite Networks
    Zhang, Ningtao; Na, Zhenyu; Tao, Jiahui ... IEEE transactions on vehicular technology, 10/2023, Volume: 72, Issue: 10
    Journal Article
    Peer reviewed

    Though low earth orbit (LEO) satellite networks have superiorities in short delay, wide coverage and flexible networking, the end-to-end (E2E) transmission has been confronted with severe challenges ...
Full text
8.
  • An Unordered Image Stitchin... An Unordered Image Stitching Method Based on Binary Tree and Estimated Overlapping Area
    Qu, Zhong; Li, Jun; Bao, Kang-Hua ... IEEE transactions on image processing, 01/2020, Volume: 29
    Journal Article
    Peer reviewed

    Aiming at the complex computation and time-consuming problem during unordered image stitching, we present a method based on the binary tree and the estimated overlapping areas to stitch images ...
Full text
9.
  • Probabilistic Decision Base... Probabilistic Decision Based Block Partitioning for Future Video Coding
    Wang, Zhao; Wang, Shiqi; Zhang, Jian ... IEEE transactions on image processing, 03/2018, Volume: 27, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    In the latest Joint Video Exploration Team development, the quadtree plus binary tree (QTBT) block partitioning structure has been proposed for future video coding. Compared to the traditional ...
Full text

PDF
10.
  • Fuzzy Option Pricing Based ... Fuzzy Option Pricing Based on Fuzzy Number Binary Tree Model
    Wang, Guixiang; Wang, Yanyan; Tang, Junmin IEEE transactions on fuzzy systems, 09/2022, Volume: 30, Issue: 9
    Journal Article
    Peer reviewed

    In this article, a new method of option pricing in the form of fuzzy number is established based on fuzzy number binary tree model. Firstly,by using the operation rules of fuzzy number addition and ...
Full text
1 2 3 4 5
hits: 3,516

Load filters