|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 33 occurrences of 27 keywords
|
|
|
Results
Found 35 publication records. Showing 35 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
49 | Luis Mengibar, Luis Entrena, Michael G. Lorenz, Raul Sánchez-Reillo |
State Encoding for Low-Power FSMs in FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design, Power and Timing Modeling, Optimization and Simulation, 13th International Workshop, PATMOS 2003, Torino, Italy, September 10-12, 2003, Proceedings, pp. 31-40, 2003, Springer, 3-540-20074-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo |
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 40-49, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RFID security and privacy |
40 | Xinchao Zhao, Hongliang Long |
Multiple bit encoding-based search algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Congress on Evolutionary Computation ![In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2005, 2-4 September 2005, Edinburgh, UK, pp. 1996-2001, 2005, IEEE, 0-7803-9363-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Michael D. Bond, Kathryn S. McKinley |
Bell: bit-encoding online memory leak detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2006, San Jose, CA, USA, October 21-25, 2006, pp. 61-72, 2006, ACM, 1-59593-451-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
low-overhead monitoring, memory leaks, probabilistic approaches, managed languages |
25 | Alex Fit-Florea, Lun Li, Mitchell A. Thornton, David W. Matula |
A Discrete Logarithm Number System for Integer Arithmetic Modulo 2k: Algorithms and Lookup Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 58(2), pp. 163-174, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Parag Agarwal, Balakrishnan Prabhakaran 0001 |
Tamper Proofing 3D Motion Data Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM (1) ![In: Advances in Multimedia Modeling, 13th International Multimedia Modeling Conference, MMM 2007, Singapore, January 9-12, 2007. Proceedings, Part I, pp. 731-740, 2007, Springer, 978-3-540-69421-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
watermarking, encoding, motion, decoding, data, Tamper proofing |
20 | Sanjay Goil, Alok N. Choudhary |
A Parallel Scalable Infrastructure for OLAP and Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: 1999 International Database Engineering and Applications Symposium, IDEAS 1999, Montreal, Canada, August 2-4, 1999, Proceedings, pp. 178-186, 1999, IEEE Computer Society, 0-7695-0265-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Multi-dimensional analysis, Bit-encoding, Data Mining, Parallelism, OLAP, High Performance, Data Cube, Chunks |
18 | Yuto Kawahara, Kazumaro Aoki, Tsuyoshi Takagi |
Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings, pp. 282-296, 2008, Springer, 978-3-540-85503-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
GF(3)-addition, logical instruction, ? T pairing |
18 | Parag Agarwal, Balakrishnan Prabhakaran 0001 |
Robust blind watermarking mechanism for point sampled geometry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 175-186, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
watermarking, encoding, decoding, blind, spatial |
15 | Chung Nan Lyu, David W. Matula |
Redundant Binary Booth Recoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Computer Arithmetic ![In: 12th Symposium on Computer Arithmetic (ARITH-12 '95), July 19-21, 1995, Bath, England, UK, pp. 50-, 1995, IEEE Computer Society, 0-8186-7089-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
14 | Zhihao Li, Benqiang Wei, Ruida Wang, Xianhui Lu, Kunpeng Wang |
Full Domain Functional Bootstrapping with Least Significant Bit Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt (1) ![In: Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I, pp. 203-223, 2023, Springer, 978-981-97-0941-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Arnab Chatterjee, Subrata Sarkar, Ishan Dutta, Suvamoy Changder |
Quantum Image Teleportation Based on Probabilistic Bit-Encoding Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PReMI ![In: Pattern Recognition and Machine Intelligence - 10th International Conference, PReMI 2023, Kolkata, India, December 12-15, 2023, Proceedings, pp. 654-662, 2023, Springer, 978-3-031-45169-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Jong-Hyeok Yoon, Muya Chang, Win-San Khwa, Yu-Der Chih, Meng-Fan Chang, Arijit Raychowdhury |
A 40-nm 118.44-TOPS/W Voltage-Sensing Compute-in-Memory RRAM Macro With Write Verification and Multi-Bit Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Solid State Circuits ![In: IEEE J. Solid State Circuits 57(3), pp. 845-857, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Youngeun Kim, Hyunsoo Kim, Seijoon Kim, Sang Joon Kim, Priyadarshini Panda |
Gradient-based Bit Encoding Optimization for Noise-Robust Binary Memristive Crossbar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.01479, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
14 | Youngeun Kim, Hyunsoo Kim, Seijoon Kim, Sang Joon Kim, Priyadarshini Panda |
Gradient-based Bit Encoding Optimization for Noise-Robust Binary Memristive Crossbar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2022 Design, Automation & Test in Europe Conference & Exhibition, DATE 2022, Antwerp, Belgium, March 14-23, 2022, pp. 1111-1114, 2022, IEEE, 978-3-9819263-6-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Ahmed Khan |
2DOTS-multi-bit-encoding for robust and imperceptible image watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 80(2), pp. 2395-2411, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Minhye Seo, Suhri Kim, Dong Hoon Lee 0001, Jong Hwan Park |
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 19(4), pp. 383-399, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Yanduo Ren, Jiangbo Qian, Yihong Dong, Yu Xin, Huahui Chen 0001 |
AVBH: Asymmetric Learning to Hash with Variable Bit Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Program. ![In: Sci. Program. 2020, pp. 2424381:1-2424381:11, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Bengt Ljungquist, Per Petersson, Anders J. Johansson, Jens Schouenborg, Martin Garwicz |
A Bit-Encoding Based New Data Structure for Time and Memory Efficient Handling of Spike Times in an Electrophysiological Setup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neuroinformatics ![In: Neuroinformatics 16(2), pp. 217-229, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Kotaro Takeda, Naoki Kobayashi 0001, Kazuya Yaguchi, Ayumi Shinohara |
Compact bit encoding schemes for simply-typed lambda-terms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFP ![In: Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming, ICFP 2016, Nara, Japan, September 18-22, 2016, pp. 146-157, 2016, ACM, 978-1-4503-4219-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Jing Li 0073, Robert K. Montoye, Masatoshi Ishii, Leland Chang |
1 Mb 0.41 µm2 2T-2R Cell Nonvolatile TCAM With Two-Bit Encoding and Clocked Self-Referenced Sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Solid State Circuits ![In: IEEE J. Solid State Circuits 49(4), pp. 896-907, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
14 | Jingchao Chen |
A Bit-Encoding Phase Selection Strategy for Satisfiability Solvers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation - 11th Annual Conference, TAMC 2014, Chennai, India, April 11-13, 2014. Proceedings, pp. 158-167, 2014, Springer, 978-3-319-06088-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
14 | Kazuya Sakai, Wei-Shinn Ku, Roger Zimmermann, Min-Te Sun |
Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 62(1), pp. 112-123, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
14 | David Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee |
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 211-222, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
DNS poisoning, DNS-0x20, computer security |
14 | Kuldip K. Paliwal, Stephen So |
A fractional bit encoding technique for the GMM-based block quantisation of images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Signal Process. ![In: Digit. Signal Process. 15(3), pp. 255-275, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Davis King 0001, Jarek Rossignac |
Guaranteed 3.67v bit encoding of planar triangle graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCCG ![In: Proceedings of the 11th Canadian Conference on Computational Geometry, UBC, Vancouver, British Columbia, Canada, August 15-18, 1999, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
14 | Peter Kornerup |
Reviewing 4-to-2 Adders for Multi-Operand Addition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 40(1), pp. 143-152, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
redundant adders, digit sets, digit encodings, multiplier trees |
14 | Peter Kornerup |
Reviewing 4-to-2 Adders for Multi-Operand Addition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASAP ![In: 13th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2002), 17-19 July 2002, San Jose, CA, USA, pp. 218-, 2002, IEEE Computer Society, 0-7695-1712-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Wai W. Fung, James W. Gray III |
On m-Permutation Protection Scheme Against Modification Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 77-87, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Wai W. Fung, James W. Gray III |
Protection Against EEPROM Modification Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 250-260, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
11 | George Andrew Spencer |
Digitization, Coded Character Sets, and Optical Character Recognition for Multi-script Information Resources: The Case of the Letopis' Zhurnal'nykh Statei. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECDL ![In: Research and Advanced Technology for Digital Libraries, 5th European Conference, ECDL 2001, Darmstadt, Germany, September 4-9, 2001, Proceedings, pp. 429-437, 2001, Springer, 3-540-42537-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
7 | Kreangsak Tamee, Pornthep Rojanavasu, Sonchai Udomthanapong, Ouen Pinngern |
Using Self-Organizing Maps with Learning Classifier System for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRICAI ![In: PRICAI 2008: Trends in Artificial Intelligence, 10th Pacific Rim International Conference on Artificial Intelligence, Hanoi, Vietnam, December 15-19, 2008. Proceedings, pp. 1071-1076, 2008, Springer, 978-3-540-89196-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intrusion Detection, Self-Organizing Map, LCS |
7 | Roi Blanco, Alvaro Barreiro |
TSP and cluster-based solutions to the reassignment of document identifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Retr. ![In: Inf. Retr. 9(4), pp. 499-517, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Document identifier reassignment, Clustering, Indexing, Compression, SVD, TSP |
7 | Roi Blanco, Alvaro Barreiro |
Document Identifier Reassignment Through Dimensionality Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIR ![In: Advances in Information Retrieval, 27th European Conference on IR Research, ECIR 2005, Santiago de Compostela, Spain, March 21-23, 2005, Proceedings, pp. 375-387, 2005, Springer, 3-540-25295-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Document identifier reassignment, indexing, compression, SVD |
7 | Rakan El-Khalil, Angelos D. Keromytis |
Hydan: Hiding Information in Program Binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 187-199, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #35 of 35 (100 per page; Change: )
|
|