Login / Signup
Methods of encrypting monotonic access structures.
Jakub Derbisz
Published in:
Ann. UMCS Informatica (2011)
Keyphrases
</>
databases
real time
information retrieval
data structure
preprocessing
significant improvement
statistical methods
qualitative and quantitative
methods require
database
neural network
genetic algorithm
artificial intelligence
multiscale
benchmark datasets
cross validation