|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 334 occurrences of 252 keywords
|
|
|
Results
Found 3585 publication records. Showing 3585 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
135 | Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?  |
Public Key Cryptography  |
2004 |
DBLP DOI BibTeX RDF |
|
104 | Yi-Ou Li, Wei Wang 0018, Tülay Adali, Vince D. Calhoun |
CCA for joint blind source separation of multiple datasets with application to group FMRI analysis.  |
ICASSP  |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Sriram Krishnan, Dennis Gannon |
XCAT3: A Framework for CCA Components as OGSA Services.  |
HIPS  |
2004 |
DBLP DOI BibTeX RDF |
Babel, XSOAP, GSX, Web Services, Grids, Components, OGSA, CCA, OGSI |
88 | Michael Backes 0001, Christian Cachin |
Public-Key Steganography with Active Attacks.  |
TCC  |
2005 |
DBLP DOI BibTeX RDF |
|
88 | Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen |
Relaxing Chosen-Ciphertext Security.  |
CRYPTO  |
2003 |
DBLP DOI BibTeX RDF |
|
77 | Liang Sun 0001, Shuiwang Ji, Jieping Ye |
A least squares formulation for canonical correlation analysis.  |
ICML  |
2008 |
DBLP DOI BibTeX RDF |
|
75 | Dong-Kweon Hong, Myung-Joon Kim, Sharma Chakravarthy |
Incorporating load factor into the scheduling of soft real-time transactions for main memory databases.  |
RTCSA  |
1996 |
DBLP DOI BibTeX RDF |
soft real-time transactions, coarse-granule locking, CCA-ALF, EDF-CR-ALF, simulations, scheduling, real-time systems, real-time database systems, main memory databases, load factor, data access patterns |
70 | Madhusudhan Govindaraju, Michael R. Head, Kenneth Chiu |
XCAT-C++: Design and Performance of a Distributed CCA Framework.  |
HiPC  |
2005 |
DBLP DOI BibTeX RDF |
XCAT-C++, multi-protocol, performance, component, CCA |
66 | Allan Aasbjerg Nielsen |
Multiset canonical correlations analysis and multispectral, truly multitemporal remote sensing data.  |
IEEE Trans. Image Process.  |
2002 |
DBLP DOI BibTeX RDF |
|
65 | Fang (Cherry) Liu, Randall Bramley |
CCA-LISI: On Designing A CCA Parallel Sparse Linear Solver Interface.  |
IPDPS  |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Maciej Malawski, Marian Bubak, Françoise Baude, Denis Caromel, Ludovic Henrio, Matthieu Morel |
Interoperability of Grid component models: GCM and CCA case study.  |
CoreGRID  |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Yunhui He, Li Zhao 0003, Cairong Zou |
Face Recognition Based on PCA/KPCA Plus CCA.  |
ICNC (2)  |
2005 |
DBLP DOI BibTeX RDF |
|
59 | Madhusudhan Govindaraju, Sriram Krishnan, Kenneth Chiu, Aleksander Slominski, Dennis Gannon, Randall Bramley |
Merging the CCA Component Model with the OGSI Framework.  |
CCGRID  |
2003 |
DBLP DOI BibTeX RDF |
Web Services, Workflow, Composition, Computational Grids, OGSA, Component Architectures, CCA, OGSI |
58 | Jun Shao, Zhenfu Cao |
CCA-Secure Proxy Re-encryption without Pairings.  |
Public Key Cryptography  |
2009 |
DBLP DOI BibTeX RDF |
Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance |
58 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.  |
ICISC  |
2008 |
DBLP DOI BibTeX RDF |
IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability |
58 | Quan-Sen Sun, Mao-Long Yang, Pheng-Ann Heng, De-Sen Xia |
Improvements on CCA Model with Application to Face Recognition.  |
Intelligent Information Processing  |
2004 |
DBLP DOI BibTeX RDF |
canonical correlation analysis(CCA), partial least squares (PLS), multivariate linear regression(MLR), feature extraction, face recognition, feature fusion |
55 | Bogdan F. Romanescu, Daniel J. Sorin |
Core cannibalization architecture: improving lifetime chip performance for multicore processors in the presence of hard faults.  |
PACT  |
2008 |
DBLP DOI BibTeX RDF |
lifetime performance, fault tolerance, reliability, multicore |
55 | Bin Zhen, Huan-Bang Li, Shinsuke Hara, Ryuji Kohno |
Energy Based Carrier Sensing in Integrated Medical Environments.  |
ICC  |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Teresa Fernandez, Michael Grinnell, Eric Weakland |
Poof: no more viruses.  |
SIGUCCS  |
2007 |
DBLP DOI BibTeX RDF |
cisco clean access, network admission control, requirements selection, transition strategy, deployment, malware, audit, virus, microsoft windows, remediation, enforcement, infection |
55 | Ron Steinfeld, Joonsang Baek, Yuliang Zheng 0001 |
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.  |
ACISP  |
2002 |
DBLP DOI BibTeX RDF |
|
55 | Nong Ye, Xiangyang Li |
A Machine Learning Algorithm Based on Supervised Clustering and Classification.  |
Active Media Technology  |
2001 |
DBLP DOI BibTeX RDF |
|
54 | Marian Bubak, Kamil Górka, Tomasz Gubala, Maciej Malawski, Katarzyna Zajac 0001 |
Component-Based System for Grid Application Workflow Composition.  |
PVM/MPI  |
2003 |
DBLP DOI BibTeX RDF |
Grid computations, OGSA, CCA, workflow composition |
53 | Ramin Rajabioun, Esmaeil Atashpaz-Gargari, Caro Lucas |
Colonial Competitive Algorithm as a Tool for Nash Equilibrium Point Achievement.  |
ICCSA (2)  |
2008 |
DBLP DOI BibTeX RDF |
Colonial Competitive Algorithm (CCA), global Nash Equilibrium, evolutionary algorithms, game theory |
50 | Paul Gowland, David R. Lester |
A Survey of Exact Arithmetic Implementations.  |
CCA  |
2000 |
DBLP DOI BibTeX RDF |
|
49 | Wei Liu 0001, Danilo P. Mandic, Andrzej Cichocki |
Analysis and Online Realization of the CCA Approach for Blind Source Separation.  |
IEEE Trans. Neural Networks  |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Yael Gertner, Tal Malkin, Steven A. Myers |
Towards a Separation of Semantic and CCA Security for Public Key Encryption.  |
TCC  |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Wei Liu 0001, Danilo P. Mandic, Andrzej Cichocki |
An analysis of the CCA approach for blind source separation and its adaptive realization.  |
ISCAS  |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions.  |
INDOCRYPT  |
2006 |
DBLP DOI BibTeX RDF |
RSA assumptions, public key encryption, chosen-ciphertext security |
49 | Fang Liu |
ACM student research competition reception - CCA-LISI: on designing a common component architecture parallel sparse linear solver interface.  |
SC  |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Maciej Malawski, Dawid Kurzyniec, Vaidy S. Sunderam |
MOCCA - Towards a Distributed CCA Framework for Metacomputing.  |
IPDPS  |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Keming Zhang, Kostadin Damevski, Venkatanand Venkatachalapathy, Steven G. Parker |
SCIRun2: A CCA Framework for High Performance Computing.  |
HIPS  |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Felipe Bertrand, Randall Bramley |
DCA: A Distributed CCA Framework Based on MPI.  |
HIPS  |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?  |
IACR Cryptol. ePrint Arch.  |
2003 |
DBLP BibTeX RDF |
|
47 | Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen |
Adaptive-CCA on OpenPGP Revisited.  |
ICICS  |
2004 |
DBLP DOI BibTeX RDF |
Chosen ciphertext attack (CCA), Encryption mode, Message format, E-mail, PGP, OpenPGP |
44 | Andrej Bauer, Peter Hertling, Ker-I Ko |
CCA 2009 Preface - Proceedings of the Sixth International Conference on Computability and Complexity in Analysis.  |
CCA  |
2009 |
DBLP BibTeX RDF |
|
44 | Andrej Bauer, Peter Hertling, Ker-I Ko |
CCA 2009 Front Matter - Proceedings of the Sixth International Conference on Computability and Complexity in Analysis.  |
CCA  |
2009 |
DBLP BibTeX RDF |
|
44 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa |
Tag-KEM/DEM: A New Framework for Hybrid Encryption.  |
J. Cryptol.  |
2008 |
DBLP DOI BibTeX RDF |
Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption |
44 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Chosen Ciphertext Security with Optimal Ciphertext Overhead.  |
ASIACRYPT  |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Xiaofeng Yu, Yan Zhang 0007, Tian Zhang 0001, Linzhang Wang, Jun Hu, Jianhua Zhao, Xuandong Li |
A model-driven development framework for enterprise Web services.  |
Inf. Syst. Frontiers  |
2007 |
DBLP DOI BibTeX RDF |
EDOC, Web services, Model-driven development |
44 | Véronique Cortier, Gavin Keighren, Graham Steel |
Automatic Analysis of the Security of XOR-Based Key Management Schemes.  |
TACAS  |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Humberto Mossri de Almeida, Marcos André Gonçalves, Marco Cristo, Pável Calado |
A combined component approach for finding collection-adapted ranking functions based on genetic programming.  |
SIGIR  |
2007 |
DBLP DOI BibTeX RDF |
machine learning, information retrieval, genetic programming, term-weighting, ranking functions |
44 | Li Li 0009, Thomas Kunz |
Localization applying an efficient neural network mapping.  |
Autonomics  |
2007 |
DBLP DOI BibTeX RDF |
curvilinear component analysis, simulations, localization, nonlinear mapping |
44 | Cairong Zou, Ning Sun 0001, Zhen-hai Ji, Li Zhao 0003 |
2DCCA: A Novel Method for Small Sample Size Face Recognition.  |
WACV  |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Jianxue Wang, Weichao Wang, Xifan Wang, Haoyong Chen, Xiuli Wang |
Cooperative Co-evolutionary Approach Applied in Reactive Power Optimization of Power System.  |
ICNC (1)  |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Steven Van Vaerenbergh, Javier Vía, Ignacio Santamaría |
Online Kernel Canonical Correlation Analysis for Supervised Equalization of Wiener Systems.  |
IJCNN  |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Petra Povalej, Peter Kokol, Tatjana Welzer-Druzovec, Bruno Stiglic |
Machine-Learning with Cellular Automata.  |
IDA  |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Mohammed A. Hasan |
Unconstrained functional criteria for canonical correlation analysis.  |
ISCAS (3)  |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Ran Canetti, Shai Halevi, Jonathan Katz |
Chosen-Ciphertext Security from Identity-Based Encryption.  |
EUROCRYPT  |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Pierre-Alain Fouque, David Pointcheval |
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks.  |
ASIACRYPT  |
2001 |
DBLP DOI BibTeX RDF |
Chosen-Ciphertext Attacks, Threshold Cryptosystems |
43 | Chen-Wo Kuo, Jiann-Min Yang, Quo-Ping Lin, Maiga Chang |
E-Learning: The Strategies of Learning Culture and Arts.  |
Edutainment  |
2009 |
DBLP DOI BibTeX RDF |
NPM, e-learning, culture, arts, CCA |
43 | Marian Bubak, Kamil Górka, Tomasz Gubala, Maciej Malawski, Katarzyna Zajac 0001 |
Automatic Flow Building for Component Grid Applications.  |
PPAM  |
2003 |
DBLP DOI BibTeX RDF |
Grid computations, OGSA, CCA, workflow composition |
42 | Richard A. Kemmerer, Tad Taylor |
A Modular Covert Channel Analysis Methodology for Trusted DG/UXTM.  |
ACSAC  |
1996 |
DBLP DOI BibTeX RDF |
modular covert channel analysis methodology, Trusted DG/UX, CCA approach, subsystem architecture, DG/UX kernel, system state, abstract object, Ratings Maintenance Program, RAMP, SRM analysis, exported function, peer subsystems, kernel-wide SRM, commercial strength Unix system, operating system kernels, system calls, modular approach |
38 | Weilong Yang, Dong Yi, Zhen Lei 0001, Jitao Sang, Stan Z. Li |
2D-3D face matching using CCA.  |
FG  |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Dan Boneh, Jonathan Katz |
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption.  |
CT-RSA  |
2005 |
DBLP DOI BibTeX RDF |
Public-key encryption, Identity-based encryption, Chosen-ciphertext security |
38 | Benjamin A. Allan, Sophia Lefantzi, Jaideep Ray |
ODEPACK++: Refactoring the LSODE Fortran Library for Use in the CCA High Performance Component Software Architecture.  |
HIPS  |
2004 |
DBLP DOI BibTeX RDF |
parallel programming, object oriented, C++, FORTRAN, interface design, differential equations, software decomposition, common component architecture |
38 | M. Shahjahan, Kazuyuki Murase |
A Neural Learning Rule for CCA Approximation.  |
ICONIP  |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Xiaoqi Jia, Jun Shao 0001, Jiwu Jing, Peng Liu 0005 |
CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy.  |
CIT  |
2010 |
DBLP DOI BibTeX RDF |
Type-based proxy re-encryption, CCA security, invisible proxy |
33 | Jianchun Zhang, Daoqiang Zhang |
Canonical random correlation analysis.  |
SAC  |
2010 |
DBLP DOI BibTeX RDF |
dimensionality reduction, discriminant, multi-view, canonical correlation analysis |
33 | Ashwin Natarajan, Ying Cai, Johnny Wong |
An enhanced client-centric approach for efficient video broadcast.  |
Multim. Tools Appl.  |
2009 |
DBLP DOI BibTeX RDF |
Video on demand, Multimedia communication, Periodic broadcast, Service latency |
33 | Li Li 0009, Thomas Kunz |
Cooperative node localization using nonlinear data projection.  |
ACM Trans. Sens. Networks  |
2009 |
DBLP DOI BibTeX RDF |
curvilinear component analysis, simulations, Localization, multi-dimensional scaling, nonlinear mapping |
33 | Seiko Arita, Koji Tsurudome |
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions.  |
ACNS  |
2009 |
DBLP DOI BibTeX RDF |
threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption |
33 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes.  |
ACISP  |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
33 | María del Rocío Gómez Díaz, Rodrigo Sandoval-Almazán |
Gestión del conocimiento estrategia de vinculación en los centros comunitarios de aprendizaje.  |
D.GO  |
2009 |
DBLP BibTeX RDF |
centros comunitarios de aprendizaje, conocimiento explícito, conocimiento tácito, gestión del conocimiento |
33 | Tingkai Sun, Songcan Chen, Jing-Yu Yang, Pengfei Shi |
A Novel Method of Combined Feature Extraction for Recognition.  |
ICDM  |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Leong Hou U, Man Lung Yiu, Kyriakos Mouratidis, Nikos Mamoulis |
Capacity constrained assignment in spatial databases.  |
SIGMOD Conference  |
2008 |
DBLP DOI BibTeX RDF |
optimal assignment, spatial databases |
33 | Goichiro Hanaoka, Kaoru Kurosawa |
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption.  |
ASIACRYPT  |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Timothée Bailloeul, Cai-Zhi Zhu, Yinghui Xu |
Automatic image tagging as a random walk with priors on the canonical correlation subspace.  |
Multimedia Information Retrieval  |
2008 |
DBLP DOI BibTeX RDF |
image retrieval, image annotation, local binary pattern, inverse document frequency |
33 | Tarik Taleb, Keisuke Ooi, Kazuo Hashimoto |
An Efficient Collision Avoidance Strategy for ITS systems.  |
WCNC  |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Hsiang-Fu Yu, Hung-Chang Yang, Chu-Yi Chien, Yao-Tien Wang |
A Limited-Client-Capability Broadcasting Scheme for VoD Applications.  |
ICN  |
2008 |
DBLP DOI BibTeX RDF |
buffer, Periodic broadcasting, video-on-demand (VOD), cable TV |
33 | Sihan Qing, Changxiang Shen |
Design of secure operating systems with high security levels.  |
Sci. China Ser. F Inf. Sci.  |
2007 |
DBLP DOI BibTeX RDF |
secure operating systems with high security levels, covert channel analysis, architecture, security model |
33 | Mehmet Emre Sargin, Yücel Yemez, Engin Erzin, A. Murat Tekalp |
Audiovisual Synchronization and Fusion Using Canonical Correlation Analysis.  |
IEEE Trans. Multim.  |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Chong Wang 0002 |
Variational Bayesian Approach to Canonical Correlation Analysis.  |
IEEE Trans. Neural Networks  |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Jian Ma, Zengqi Sun |
Copula Component Analysis.  |
ICA  |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Tae-Kyun Kim, Shu-Fai Wong, Roberto Cipolla |
Tensor Canonical Correlation Analysis for Action Classification.  |
CVPR  |
2007 |
DBLP DOI BibTeX RDF |
|
33 | José Alonso Ybáñez Zepeda, Franck Davoine, Maurice Charbit |
A linear estimation method for 3D pose and facial animation tracking.  |
CVPR  |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Sham M. Kakade, Dean P. Foster |
Multi-view Regression Via Canonical Correlation Analysis.  |
COLT  |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Bryan D. Thompson, Mahmood R. Azimi-Sadjadi |
An Iterative Learning Algorithm for Multi-Channel Coherence Analysis.  |
IJCNN  |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Mustafa Karakoç, Adnan Kavak |
Stochastic Optimization Algorithm Based Dynamic Resource Assignment for 3G Systems.  |
NEW2AN  |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Joakim Rydell, Hans Knutsson, Magnus Borga |
Rotational Invariance in Adaptive fMRI Data Analysis.  |
ICIP  |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Kenji Yoshihira |
Combining supervised and unsupervised monitoring for fault detection in distributed computing systems.  |
SAC  |
2006 |
DBLP DOI BibTeX RDF |
supervised monitoring, distributed computing, fault detection, internet services, canonical correlation analysis |
33 | Michael Reiter, Rene Donner, Georg Langs, Horst Bischof |
3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis.  |
ICPR (1)  |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Ryotaro Hayashi 0001, Keisuke Tanaka |
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity.  |
ACISP  |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Yen-Jen Chang |
An Alternative Real-Time Filter Scheme to Block Buffering.  |
VLSI Design  |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Nicholas Hopper |
On Steganographic Chosen Covertext Security.  |
ICALP  |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Petra Povalej, Mitja Lenic, Peter Kokol |
Improving Ensembles with Classificational Cellular Automata.  |
IDEAL  |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Amir R. Razavi, Hans Gill, Hans Åhlfeldt, Nosrat Shahsavar |
A Data Pre-processing Method to Increase Efficiency and Accuracy in Data Mining.  |
AIME  |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Boyana Norris |
Software Architecture Issues in Scientific Component Development.  |
PARA  |
2004 |
DBLP DOI BibTeX RDF |
|
33 | David E. Bernholdt |
High-Performance Parallel and Distributed Scientific Computing with the Common Component Architecture.  |
International Conference on Computational Science  |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Kaoru Kurosawa, Yvo Desmedt |
A New Paradigm of Hybrid Encryption Scheme.  |
CRYPTO  |
2004 |
DBLP DOI BibTeX RDF |
KEM, standard model, hybrid encryption |
33 | Hong-Yi Huang, Shih-Lun Chen |
Threshold triggers and accelerator for deep submicron interconnection.  |
APCCAS (2)  |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Pei Ling Lai, Colin Fyfe |
Kernel and Nonlinear Canonical Correlation Analysis.  |
IJCNN (4)  |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Da-Chuan Cheng, Kuo-Sheng Cheng, Arno Schmidt-Trucksäss, Markus Sandrock, Qin Pu, Hans Burkhardt |
Automatic Detection of the Intimal and the Adventitial Layers of the Common Carotid Artery Wall in Ultrasound B-Mode Images Using Snakes.  |
ICIAP  |
1999 |
DBLP DOI BibTeX RDF |
|
32 | Shanshan Li, Qun Wang |
DHPA: A New Distributed High Performance Architecture for Space Environment Modeling and Simulation.  |
ITNG  |
2008 |
DBLP DOI BibTeX RDF |
Space environment, Simulation, High Performance Computing, CCA, Modeling Framework |
32 | Sanja Fidler, Danijel Skocaj, Ales Leonardis |
Combining Reconstructive and Discriminative Subspace Methods for Robust Classification and Regression by Subsampling.  |
IEEE Trans. Pattern Anal. Mach. Intell.  |
2006 |
DBLP DOI BibTeX RDF |
reconstructive methods, discriminative methods, robust classification, high-breakdown point classification, PCA, occlusion, outlier detection, LDA, Subspace methods, CCA, subsampling, robust regression |
32 | Dennis Gannon, Sriram Krishnan, Liang Fang, Gopi Kandaswamy, Yogesh Simmhan, Aleksander Slominski |
On Building Parallel & Grid Applications: Component Technology and Distributed Services.  |
Clust. Comput.  |
2005 |
DBLP DOI BibTeX RDF |
grid web services, XCAT, component framework, CCA |
32 | Yoshio Takane, Michael A. Hunter |
Constrained Principal Component Analysis: A Comprehensive Theory.  |
Appl. Algebra Eng. Commun. Comput.  |
2001 |
DBLP DOI BibTeX RDF |
GSVD (generalized singular value decomposition), CALC, GMANOVA, Lagrange's theorem, CANO, CA (correspondence analysis), Projection, CCA |
32 | Jiangxia Ge, Tianshu Shan, Rui Xue 0001 |
On the Fujisaki-Okamoto transform: from Classical CCA Security to Quantum CCA Security.  |
IACR Cryptol. ePrint Arch.  |
2023 |
DBLP BibTeX RDF |
|
32 | James Chapman 0006, Hao-Ting Wang |
CCA-Zoo: A collection of Regularized, Deep Learning based, Kernel, and Probabilistic CCA methods in a scikit-learn style framework.  |
J. Open Source Softw.  |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Daniel Jost 0001, Christian Badertscher, Fabio Banfi |
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT.  |
IACR Cryptol. ePrint Arch.  |
2018 |
DBLP BibTeX RDF |
|
32 | Hossam M. Farag, Aamir Mahmood, Mikael Gidlund, Patrik Österberg |
PR-CCA MAC: A Prioritized Random CCA MAC Protocol for Mission-Critical IoT Applications.  |
ICC  |
2018 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 3585 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|