The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for CCA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1996 (18) 1999-2000 (37) 2001-2002 (43) 2003 (15) 2004 (49) 2005 (71) 2006 (61) 2007 (361) 2008 (242) 2009 (391) 2010 (327) 2011 (196) 2012 (271) 2013 (220) 2014 (339) 2015 (337) 2016 (255) 2017 (42) 2018 (61) 2019 (67) 2020 (50) 2021 (43) 2022 (40) 2023 (39) 2024 (10)
Publication types (Num. hits)
article(384) inproceedings(3179) phdthesis(2) proceedings(20)
Venues (Conferences, Journals, ...)
CCA(2344) CCA/ISIC(317) IACR Cryptol. ePrint Arch.(93) CoRR(38) ACISP(16) Comput. J.(15) ICASSP(13) ASIACRYPT(10) CT-RSA(10) Public Key Cryptography(10) ICML(9) IJCNN(8) Secur. Commun. Networks(8) CRYPTO(7) INDOCRYPT(7) Inscrypt(7) More (+10 of total 451)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 334 occurrences of 252 keywords

Results
Found 3585 publication records. Showing 3585 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
135Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
104Yi-Ou Li, Wei Wang 0018, Tülay Adali, Vince D. Calhoun CCA for joint blind source separation of multiple datasets with application to group FMRI analysis. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
92Sriram Krishnan, Dennis Gannon XCAT3: A Framework for CCA Components as OGSA Services. Search on Bibsonomy HIPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Babel, XSOAP, GSX, Web Services, Grids, Components, OGSA, CCA, OGSI
88Michael Backes 0001, Christian Cachin Public-Key Steganography with Active Attacks. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
88Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen Relaxing Chosen-Ciphertext Security. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
77Liang Sun 0001, Shuiwang Ji, Jieping Ye A least squares formulation for canonical correlation analysis. Search on Bibsonomy ICML The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
75Dong-Kweon Hong, Myung-Joon Kim, Sharma Chakravarthy Incorporating load factor into the scheduling of soft real-time transactions for main memory databases. Search on Bibsonomy RTCSA The full citation details ... 1996 DBLP  DOI  BibTeX  RDF soft real-time transactions, coarse-granule locking, CCA-ALF, EDF-CR-ALF, simulations, scheduling, real-time systems, real-time database systems, main memory databases, load factor, data access patterns
70Madhusudhan Govindaraju, Michael R. Head, Kenneth Chiu XCAT-C++: Design and Performance of a Distributed CCA Framework. Search on Bibsonomy HiPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XCAT-C++, multi-protocol, performance, component, CCA
66Allan Aasbjerg Nielsen Multiset canonical correlations analysis and multispectral, truly multitemporal remote sensing data. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
65Fang (Cherry) Liu, Randall Bramley CCA-LISI: On Designing A CCA Parallel Sparse Linear Solver Interface. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
60Maciej Malawski, Marian Bubak, Françoise Baude, Denis Caromel, Ludovic Henrio, Matthieu Morel Interoperability of Grid component models: GCM and CCA case study. Search on Bibsonomy CoreGRID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
60Yunhui He, Li Zhao 0003, Cairong Zou Face Recognition Based on PCA/KPCA Plus CCA. Search on Bibsonomy ICNC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
59Madhusudhan Govindaraju, Sriram Krishnan, Kenneth Chiu, Aleksander Slominski, Dennis Gannon, Randall Bramley Merging the CCA Component Model with the OGSI Framework. Search on Bibsonomy CCGRID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Web Services, Workflow, Composition, Computational Grids, OGSA, Component Architectures, CCA, OGSI
58Jun Shao, Zhenfu Cao CCA-Secure Proxy Re-encryption without Pairings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance
58Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability
58Quan-Sen Sun, Mao-Long Yang, Pheng-Ann Heng, De-Sen Xia Improvements on CCA Model with Application to Face Recognition. Search on Bibsonomy Intelligent Information Processing The full citation details ... 2004 DBLP  DOI  BibTeX  RDF canonical correlation analysis(CCA), partial least squares (PLS), multivariate linear regression(MLR), feature extraction, face recognition, feature fusion
55Bogdan F. Romanescu, Daniel J. Sorin Core cannibalization architecture: improving lifetime chip performance for multicore processors in the presence of hard faults. Search on Bibsonomy PACT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF lifetime performance, fault tolerance, reliability, multicore
55Bin Zhen, Huan-Bang Li, Shinsuke Hara, Ryuji Kohno Energy Based Carrier Sensing in Integrated Medical Environments. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Teresa Fernandez, Michael Grinnell, Eric Weakland Poof: no more viruses. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cisco clean access, network admission control, requirements selection, transition strategy, deployment, malware, audit, virus, microsoft windows, remediation, enforcement, infection
55Ron Steinfeld, Joonsang Baek, Yuliang Zheng 0001 On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
55Nong Ye, Xiangyang Li A Machine Learning Algorithm Based on Supervised Clustering and Classification. Search on Bibsonomy Active Media Technology The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
54Marian Bubak, Kamil Górka, Tomasz Gubala, Maciej Malawski, Katarzyna Zajac 0001 Component-Based System for Grid Application Workflow Composition. Search on Bibsonomy PVM/MPI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Grid computations, OGSA, CCA, workflow composition
53Ramin Rajabioun, Esmaeil Atashpaz-Gargari, Caro Lucas Colonial Competitive Algorithm as a Tool for Nash Equilibrium Point Achievement. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Colonial Competitive Algorithm (CCA), global Nash Equilibrium, evolutionary algorithms, game theory
50Paul Gowland, David R. Lester A Survey of Exact Arithmetic Implementations. Search on Bibsonomy CCA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
49Wei Liu 0001, Danilo P. Mandic, Andrzej Cichocki Analysis and Online Realization of the CCA Approach for Blind Source Separation. Search on Bibsonomy IEEE Trans. Neural Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Yael Gertner, Tal Malkin, Steven A. Myers Towards a Separation of Semantic and CCA Security for Public Key Encryption. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Wei Liu 0001, Danilo P. Mandic, Andrzej Cichocki An analysis of the CCA approach for blind source separation and its adaptive realization. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA assumptions, public key encryption, chosen-ciphertext security
49Fang Liu ACM student research competition reception - CCA-LISI: on designing a common component architecture parallel sparse linear solver interface. Search on Bibsonomy SC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Maciej Malawski, Dawid Kurzyniec, Vaidy S. Sunderam MOCCA - Towards a Distributed CCA Framework for Metacomputing. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Keming Zhang, Kostadin Damevski, Venkatanand Venkatachalapathy, Steven G. Parker SCIRun2: A CCA Framework for High Performance Computing. Search on Bibsonomy HIPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
49Felipe Bertrand, Randall Bramley DCA: A Distributed CCA Framework Based on MPI. Search on Bibsonomy HIPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2003 DBLP  BibTeX  RDF
47Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen Adaptive-CCA on OpenPGP Revisited. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Chosen ciphertext attack (CCA), Encryption mode, Message format, E-mail, PGP, OpenPGP
44Andrej Bauer, Peter Hertling, Ker-I Ko CCA 2009 Preface - Proceedings of the Sixth International Conference on Computability and Complexity in Analysis. Search on Bibsonomy CCA The full citation details ... 2009 DBLP  BibTeX  RDF
44Andrej Bauer, Peter Hertling, Ker-I Ko CCA 2009 Front Matter - Proceedings of the Sixth International Conference on Computability and Complexity in Analysis. Search on Bibsonomy CCA The full citation details ... 2009 DBLP  BibTeX  RDF
44Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa Tag-KEM/DEM: A New Framework for Hybrid Encryption. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption
44Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto Chosen Ciphertext Security with Optimal Ciphertext Overhead. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Xiaofeng Yu, Yan Zhang 0007, Tian Zhang 0001, Linzhang Wang, Jun Hu, Jianhua Zhao, Xuandong Li A model-driven development framework for enterprise Web services. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF EDOC, Web services, Model-driven development
44Véronique Cortier, Gavin Keighren, Graham Steel Automatic Analysis of the Security of XOR-Based Key Management Schemes. Search on Bibsonomy TACAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Humberto Mossri de Almeida, Marcos André Gonçalves, Marco Cristo, Pável Calado A combined component approach for finding collection-adapted ranking functions based on genetic programming. Search on Bibsonomy SIGIR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF machine learning, information retrieval, genetic programming, term-weighting, ranking functions
44Li Li 0009, Thomas Kunz Localization applying an efficient neural network mapping. Search on Bibsonomy Autonomics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF curvilinear component analysis, simulations, localization, nonlinear mapping
44Cairong Zou, Ning Sun 0001, Zhen-hai Ji, Li Zhao 0003 2DCCA: A Novel Method for Small Sample Size Face Recognition. Search on Bibsonomy WACV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Jianxue Wang, Weichao Wang, Xifan Wang, Haoyong Chen, Xiuli Wang Cooperative Co-evolutionary Approach Applied in Reactive Power Optimization of Power System. Search on Bibsonomy ICNC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Steven Van Vaerenbergh, Javier Vía, Ignacio Santamaría Online Kernel Canonical Correlation Analysis for Supervised Equalization of Wiener Systems. Search on Bibsonomy IJCNN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Petra Povalej, Peter Kokol, Tatjana Welzer-Druzovec, Bruno Stiglic Machine-Learning with Cellular Automata. Search on Bibsonomy IDA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Mohammed A. Hasan Unconstrained functional criteria for canonical correlation analysis. Search on Bibsonomy ISCAS (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Ran Canetti, Shai Halevi, Jonathan Katz Chosen-Ciphertext Security from Identity-Based Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Pierre-Alain Fouque, David Pointcheval Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Chosen-Ciphertext Attacks, Threshold Cryptosystems
43Chen-Wo Kuo, Jiann-Min Yang, Quo-Ping Lin, Maiga Chang E-Learning: The Strategies of Learning Culture and Arts. Search on Bibsonomy Edutainment The full citation details ... 2009 DBLP  DOI  BibTeX  RDF NPM, e-learning, culture, arts, CCA
43Marian Bubak, Kamil Górka, Tomasz Gubala, Maciej Malawski, Katarzyna Zajac 0001 Automatic Flow Building for Component Grid Applications. Search on Bibsonomy PPAM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Grid computations, OGSA, CCA, workflow composition
42Richard A. Kemmerer, Tad Taylor A Modular Covert Channel Analysis Methodology for Trusted DG/UXTM. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF modular covert channel analysis methodology, Trusted DG/UX, CCA approach, subsystem architecture, DG/UX kernel, system state, abstract object, Ratings Maintenance Program, RAMP, SRM analysis, exported function, peer subsystems, kernel-wide SRM, commercial strength Unix system, operating system kernels, system calls, modular approach
38Weilong Yang, Dong Yi, Zhen Lei 0001, Jitao Sang, Stan Z. Li 2D-3D face matching using CCA. Search on Bibsonomy FG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Dan Boneh, Jonathan Katz Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Public-key encryption, Identity-based encryption, Chosen-ciphertext security
38Benjamin A. Allan, Sophia Lefantzi, Jaideep Ray ODEPACK++: Refactoring the LSODE Fortran Library for Use in the CCA High Performance Component Software Architecture. Search on Bibsonomy HIPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF parallel programming, object oriented, C++, FORTRAN, interface design, differential equations, software decomposition, common component architecture
38M. Shahjahan, Kazuyuki Murase A Neural Learning Rule for CCA Approximation. Search on Bibsonomy ICONIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Xiaoqi Jia, Jun Shao 0001, Jiwu Jing, Peng Liu 0005 CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Type-based proxy re-encryption, CCA security, invisible proxy
33Jianchun Zhang, Daoqiang Zhang Canonical random correlation analysis. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dimensionality reduction, discriminant, multi-view, canonical correlation analysis
33Ashwin Natarajan, Ying Cai, Johnny Wong An enhanced client-centric approach for efficient video broadcast. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Video on demand, Multimedia communication, Periodic broadcast, Service latency
33Li Li 0009, Thomas Kunz Cooperative node localization using nonlinear data projection. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF curvilinear component analysis, simulations, Localization, multi-dimensional scaling, nonlinear mapping
33Seiko Arita, Koji Tsurudome Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption
33Kenneth G. Paterson, Sriramkrishnan Srinivasan Building Key-Private Public-Key Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy
33María del Rocío Gómez Díaz, Rodrigo Sandoval-Almazán Gestión del conocimiento estrategia de vinculación en los centros comunitarios de aprendizaje. Search on Bibsonomy D.GO The full citation details ... 2009 DBLP  BibTeX  RDF centros comunitarios de aprendizaje, conocimiento explícito, conocimiento tácito, gestión del conocimiento
33Tingkai Sun, Songcan Chen, Jing-Yu Yang, Pengfei Shi A Novel Method of Combined Feature Extraction for Recognition. Search on Bibsonomy ICDM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Leong Hou U, Man Lung Yiu, Kyriakos Mouratidis, Nikos Mamoulis Capacity constrained assignment in spatial databases. Search on Bibsonomy SIGMOD Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF optimal assignment, spatial databases
33Goichiro Hanaoka, Kaoru Kurosawa Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Timothée Bailloeul, Cai-Zhi Zhu, Yinghui Xu Automatic image tagging as a random walk with priors on the canonical correlation subspace. Search on Bibsonomy Multimedia Information Retrieval The full citation details ... 2008 DBLP  DOI  BibTeX  RDF image retrieval, image annotation, local binary pattern, inverse document frequency
33Tarik Taleb, Keisuke Ooi, Kazuo Hashimoto An Efficient Collision Avoidance Strategy for ITS systems. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Hsiang-Fu Yu, Hung-Chang Yang, Chu-Yi Chien, Yao-Tien Wang A Limited-Client-Capability Broadcasting Scheme for VoD Applications. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF buffer, Periodic broadcasting, video-on-demand (VOD), cable TV
33Sihan Qing, Changxiang Shen Design of secure operating systems with high security levels. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure operating systems with high security levels, covert channel analysis, architecture, security model
33Mehmet Emre Sargin, Yücel Yemez, Engin Erzin, A. Murat Tekalp Audiovisual Synchronization and Fusion Using Canonical Correlation Analysis. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Chong Wang 0002 Variational Bayesian Approach to Canonical Correlation Analysis. Search on Bibsonomy IEEE Trans. Neural Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Jian Ma, Zengqi Sun Copula Component Analysis. Search on Bibsonomy ICA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Tae-Kyun Kim, Shu-Fai Wong, Roberto Cipolla Tensor Canonical Correlation Analysis for Action Classification. Search on Bibsonomy CVPR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33José Alonso Ybáñez Zepeda, Franck Davoine, Maurice Charbit A linear estimation method for 3D pose and facial animation tracking. Search on Bibsonomy CVPR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Sham M. Kakade, Dean P. Foster Multi-view Regression Via Canonical Correlation Analysis. Search on Bibsonomy COLT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Bryan D. Thompson, Mahmood R. Azimi-Sadjadi An Iterative Learning Algorithm for Multi-Channel Coherence Analysis. Search on Bibsonomy IJCNN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Mustafa Karakoç, Adnan Kavak Stochastic Optimization Algorithm Based Dynamic Resource Assignment for 3G Systems. Search on Bibsonomy NEW2AN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Joakim Rydell, Hans Knutsson, Magnus Borga Rotational Invariance in Adaptive fMRI Data Analysis. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Kenji Yoshihira Combining supervised and unsupervised monitoring for fault detection in distributed computing systems. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF supervised monitoring, distributed computing, fault detection, internet services, canonical correlation analysis
33Michael Reiter, Rene Donner, Georg Langs, Horst Bischof 3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis. Search on Bibsonomy ICPR (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Ryotaro Hayashi 0001, Keisuke Tanaka PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Yen-Jen Chang An Alternative Real-Time Filter Scheme to Block Buffering. Search on Bibsonomy VLSI Design The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Nicholas Hopper On Steganographic Chosen Covertext Security. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Petra Povalej, Mitja Lenic, Peter Kokol Improving Ensembles with Classificational Cellular Automata. Search on Bibsonomy IDEAL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Amir R. Razavi, Hans Gill, Hans Åhlfeldt, Nosrat Shahsavar A Data Pre-processing Method to Increase Efficiency and Accuracy in Data Mining. Search on Bibsonomy AIME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Boyana Norris Software Architecture Issues in Scientific Component Development. Search on Bibsonomy PARA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33David E. Bernholdt High-Performance Parallel and Distributed Scientific Computing with the Common Component Architecture. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Kaoru Kurosawa, Yvo Desmedt A New Paradigm of Hybrid Encryption Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF KEM, standard model, hybrid encryption
33Hong-Yi Huang, Shih-Lun Chen Threshold triggers and accelerator for deep submicron interconnection. Search on Bibsonomy APCCAS (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Pei Ling Lai, Colin Fyfe Kernel and Nonlinear Canonical Correlation Analysis. Search on Bibsonomy IJCNN (4) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
33Da-Chuan Cheng, Kuo-Sheng Cheng, Arno Schmidt-Trucksäss, Markus Sandrock, Qin Pu, Hans Burkhardt Automatic Detection of the Intimal and the Adventitial Layers of the Common Carotid Artery Wall in Ultrasound B-Mode Images Using Snakes. Search on Bibsonomy ICIAP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
32Shanshan Li, Qun Wang DHPA: A New Distributed High Performance Architecture for Space Environment Modeling and Simulation. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Space environment, Simulation, High Performance Computing, CCA, Modeling Framework
32Sanja Fidler, Danijel Skocaj, Ales Leonardis Combining Reconstructive and Discriminative Subspace Methods for Robust Classification and Regression by Subsampling. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF reconstructive methods, discriminative methods, robust classification, high-breakdown point classification, PCA, occlusion, outlier detection, LDA, Subspace methods, CCA, subsampling, robust regression
32Dennis Gannon, Sriram Krishnan, Liang Fang, Gopi Kandaswamy, Yogesh Simmhan, Aleksander Slominski On Building Parallel & Grid Applications: Component Technology and Distributed Services. Search on Bibsonomy Clust. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF grid web services, XCAT, component framework, CCA
32Yoshio Takane, Michael A. Hunter Constrained Principal Component Analysis: A Comprehensive Theory. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF GSVD (generalized singular value decomposition), CALC, GMANOVA, Lagrange's theorem, CANO, CA (correspondence analysis), Projection, CCA
32Jiangxia Ge, Tianshu Shan, Rui Xue 0001 On the Fujisaki-Okamoto transform: from Classical CCA Security to Quantum CCA Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
32James Chapman 0006, Hao-Ting Wang CCA-Zoo: A collection of Regularized, Deep Learning based, Kernel, and Probabilistic CCA methods in a scikit-learn style framework. Search on Bibsonomy J. Open Source Softw. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Daniel Jost 0001, Christian Badertscher, Fabio Banfi A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
32Hossam M. Farag, Aamir Mahmood, Mikael Gidlund, Patrik Österberg PR-CCA MAC: A Prioritized Random CCA MAC Protocol for Mission-Critical IoT Applications. Search on Bibsonomy ICC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 3585 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license