|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 334 occurrences of 252 keywords
|
|
|
Results
Found 3585 publication records. Showing 3585 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
135 | Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 360-374, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
104 | Yi-Ou Li, Wei Wang 0018, Tülay Adali, Vince D. Calhoun |
CCA for joint blind source separation of multiple datasets with application to group FMRI analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, USA, pp. 1837-1840, 2008, IEEE, 1-4244-1484-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Sriram Krishnan, Dennis Gannon |
XCAT3: A Framework for CCA Components as OGSA Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIPS ![In: 9th International Workshop on High-Level Programming Models and Supportive Environments (HIPS 2004), 26 April 2004, Santa Fe, NM, USA, pp. 90-97, 2004, IEEE Computer Society, 0-7695-2151-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Babel, XSOAP, GSX, Web Services, Grids, Components, OGSA, CCA, OGSI |
88 | Michael Backes 0001, Christian Cachin |
Public-Key Steganography with Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 210-226, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
88 | Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen |
Relaxing Chosen-Ciphertext Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 565-582, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
77 | Liang Sun 0001, Shuiwang Ji, Jieping Ye |
A least squares formulation for canonical correlation analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML ![In: Machine Learning, Proceedings of the Twenty-Fifth International Conference (ICML 2008), Helsinki, Finland, June 5-9, 2008, pp. 1024-1031, 2008, ACM, 978-1-60558-205-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
75 | Dong-Kweon Hong, Myung-Joon Kim, Sharma Chakravarthy |
Incorporating load factor into the scheduling of soft real-time transactions for main memory databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA ![In: Third International Workshop on Real-Time Computing Systems Application (RTCSA '96), October 30 - November 01, 1996, Seoul, Korea, pp. 60-66, 1996, IEEE Computer Society, 0-8186-7626-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
soft real-time transactions, coarse-granule locking, CCA-ALF, EDF-CR-ALF, simulations, scheduling, real-time systems, real-time database systems, main memory databases, load factor, data access patterns |
70 | Madhusudhan Govindaraju, Michael R. Head, Kenneth Chiu |
XCAT-C++: Design and Performance of a Distributed CCA Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPC ![In: High Performance Computing - HiPC 2005, 12th International Conference, Goa, India, December 18-21, 2005, Proceedings, pp. 270-279, 2005, Springer, 3-540-30936-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
XCAT-C++, multi-protocol, performance, component, CCA |
66 | Allan Aasbjerg Nielsen |
Multiset canonical correlations analysis and multispectral, truly multitemporal remote sensing data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 11(3), pp. 293-305, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
65 | Fang (Cherry) Liu, Randall Bramley |
CCA-LISI: On Designing A CCA Parallel Sparse Linear Solver Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach, California, USA, pp. 1-10, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Maciej Malawski, Marian Bubak, Françoise Baude, Denis Caromel, Ludovic Henrio, Matthieu Morel |
Interoperability of Grid component models: GCM and CCA case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoreGRID ![In: Towards Next Generation Grids, Proceedings of the CoreGRID Symposium 2007, August 27-28, Rennes, France, pp. 95-105, 2007, Springer, 978-0-387-72497-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Yunhui He, Li Zhao 0003, Cairong Zou |
Face Recognition Based on PCA/KPCA Plus CCA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (2) ![In: Advances in Natural Computation, First International Conference, ICNC 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II, pp. 71-74, 2005, Springer, 3-540-28325-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
59 | Madhusudhan Govindaraju, Sriram Krishnan, Kenneth Chiu, Aleksander Slominski, Dennis Gannon, Randall Bramley |
Merging the CCA Component Model with the OGSI Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 12-15 May 2003, Tokyo, Japan, pp. 182-189, 2003, IEEE Computer Society, 0-7695-1919-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Web Services, Workflow, Composition, Computational Grids, OGSA, Component Architectures, CCA, OGSI |
58 | Jun Shao, Zhenfu Cao |
CCA-Secure Proxy Re-encryption without Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 357-376, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance |
58 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 1-19, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability |
58 | Quan-Sen Sun, Mao-Long Yang, Pheng-Ann Heng, De-Sen Xia |
Improvements on CCA Model with Application to Face Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Information Processing ![In: Intelligent Information Processing II, IFIP TC12/WG12.3 International Conference on Intelligent Information Processing (IIP 2004), October 21-23, 2004, Beijing, China, pp. 124-134, 2004, Springer, 0-387-23151-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
canonical correlation analysis(CCA), partial least squares (PLS), multivariate linear regression(MLR), feature extraction, face recognition, feature fusion |
55 | Bogdan F. Romanescu, Daniel J. Sorin |
Core cannibalization architecture: improving lifetime chip performance for multicore processors in the presence of hard faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACT ![In: 17th International Conference on Parallel Architectures and Compilation Techniques, PACT 2008, Toronto, Ontario, Canada, October 25-29, 2008, pp. 43-51, 2008, ACM, 978-1-60558-282-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
lifetime performance, fault tolerance, reliability, multicore |
55 | Bin Zhen, Huan-Bang Li, Shinsuke Hara, Ryuji Kohno |
Energy Based Carrier Sensing in Integrated Medical Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 3110-3114, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Teresa Fernandez, Michael Grinnell, Eric Weakland |
Poof: no more viruses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services 2007, Orlando, Florida, USA, October 7-10, 2007, pp. 96-100, 2007, ACM, 978-1-59593-634-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cisco clean access, network admission control, requirements selection, transition strategy, deployment, malware, audit, virus, microsoft windows, remediation, enforcement, infection |
55 | Ron Steinfeld, Joonsang Baek, Yuliang Zheng 0001 |
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 241-256, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
55 | Nong Ye, Xiangyang Li |
A Machine Learning Algorithm Based on Supervised Clustering and Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Active Media Technology ![In: Active Media Technology, 6th International Computer Science Conference, AMT 2001, Hong Kong, China, December 18-20, 2001, Proceedings, pp. 327-334, 2001, Springer, 3-540-43035-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
54 | Marian Bubak, Kamil Górka, Tomasz Gubala, Maciej Malawski, Katarzyna Zajac 0001 |
Component-Based System for Grid Application Workflow Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PVM/MPI ![In: Recent Advances in Parallel Virtual Machine and Message Passing Interface,10th European PVM/MPI Users' Group Meeting, Venice, Italy, September 29 - October 2, 2003, Proceedings, pp. 611-618, 2003, Springer, 3-540-20149-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Grid computations, OGSA, CCA, workflow composition |
53 | Ramin Rajabioun, Esmaeil Atashpaz-Gargari, Caro Lucas |
Colonial Competitive Algorithm as a Tool for Nash Equilibrium Point Achievement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part II, pp. 680-695, 2008, Springer, 978-3-540-69840-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Colonial Competitive Algorithm (CCA), global Nash Equilibrium, evolutionary algorithms, game theory |
50 | Paul Gowland, David R. Lester |
A Survey of Exact Arithmetic Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCA ![In: Computability and Complexity in Analysis, 4th International Workshop, CCA 2000, Swansea, UK, September 17-19, 2000, Selected Papers, pp. 30-47, 2000, Springer, 3-540-42197-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
49 | Wei Liu 0001, Danilo P. Mandic, Andrzej Cichocki |
Analysis and Online Realization of the CCA Approach for Blind Source Separation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Neural Networks ![In: IEEE Trans. Neural Networks 18(5), pp. 1505-1510, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Yael Gertner, Tal Malkin, Steven A. Myers |
Towards a Separation of Semantic and CCA Security for Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 434-455, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Wei Liu 0001, Danilo P. Mandic, Andrzej Cichocki |
An analysis of the CCA approach for blind source separation and its adaptive realization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece, 2006, IEEE, 0-7803-9389-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 176-190, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RSA assumptions, public key encryption, chosen-ciphertext security |
49 | Fang Liu |
ACM student research competition reception - CCA-LISI: on designing a common component architecture parallel sparse linear solver interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC ![In: Proceedings of the ACM/IEEE SC2006 Conference on High Performance Networking and Computing, November 11-17, 2006, Tampa, FL, USA, pp. 131, 2006, ACM Press, 0-7695-2700-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Maciej Malawski, Dawid Kurzyniec, Vaidy S. Sunderam |
MOCCA - Towards a Distributed CCA Framework for Metacomputing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Keming Zhang, Kostadin Damevski, Venkatanand Venkatachalapathy, Steven G. Parker |
SCIRun2: A CCA Framework for High Performance Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIPS ![In: 9th International Workshop on High-Level Programming Models and Supportive Environments (HIPS 2004), 26 April 2004, Santa Fe, NM, USA, pp. 72-79, 2004, IEEE Computer Society, 0-7695-2151-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Felipe Bertrand, Randall Bramley |
DCA: A Distributed CCA Framework Based on MPI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIPS ![In: 9th International Workshop on High-Level Programming Models and Supportive Environments (HIPS 2004), 26 April 2004, Santa Fe, NM, USA, pp. 80-89, 2004, IEEE Computer Society, 0-7695-2151-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 181, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
47 | Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen |
Adaptive-CCA on OpenPGP Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 452-464, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Chosen ciphertext attack (CCA), Encryption mode, Message format, E-mail, PGP, OpenPGP |
44 | Andrej Bauer, Peter Hertling, Ker-I Ko |
CCA 2009 Preface - Proceedings of the Sixth International Conference on Computability and Complexity in Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCA ![In: Sixth International Conference on Computability and Complexity in Analysis, CCA 2009, August 18-22, 2009, Ljubljana, Slovenia, 2009, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
44 | Andrej Bauer, Peter Hertling, Ker-I Ko |
CCA 2009 Front Matter - Proceedings of the Sixth International Conference on Computability and Complexity in Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCA ![In: Sixth International Conference on Computability and Complexity in Analysis, CCA 2009, August 18-22, 2009, Ljubljana, Slovenia, 2009, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
44 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa |
Tag-KEM/DEM: A New Framework for Hybrid Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(1), pp. 97-130, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption |
44 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Chosen Ciphertext Security with Optimal Ciphertext Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 355-371, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Xiaofeng Yu, Yan Zhang 0007, Tian Zhang 0001, Linzhang Wang, Jun Hu, Jianhua Zhao, Xuandong Li |
A model-driven development framework for enterprise Web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 9(4), pp. 391-409, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
EDOC, Web services, Model-driven development |
44 | Véronique Cortier, Gavin Keighren, Graham Steel |
Automatic Analysis of the Security of XOR-Based Key Management Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 13th International Conference, TACAS 2007, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2007 Braga, Portugal, March 24 - April 1, 2007, Proceedings, pp. 538-552, 2007, Springer, 978-3-540-71208-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Humberto Mossri de Almeida, Marcos André Gonçalves, Marco Cristo, Pável Calado |
A combined component approach for finding collection-adapted ranking functions based on genetic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: SIGIR 2007: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Amsterdam, The Netherlands, July 23-27, 2007, pp. 399-406, 2007, ACM, 978-1-59593-597-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
machine learning, information retrieval, genetic programming, term-weighting, ranking functions |
44 | Li Li 0009, Thomas Kunz |
Localization applying an efficient neural network mapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autonomics ![In: Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics 2007, 28-30 October 2007, Rome, Italy, pp. 1, 2007, ACM, 978-963-9799-09-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
curvilinear component analysis, simulations, localization, nonlinear mapping |
44 | Cairong Zou, Ning Sun 0001, Zhen-hai Ji, Li Zhao 0003 |
2DCCA: A Novel Method for Small Sample Size Face Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WACV ![In: 8th IEEE Workshop on Applications of Computer Vision (WACV 2007), 20-21 February 2007, Austin, Texas, USA, pp. 43, 2007, IEEE Computer Society, 978-0-7695-2794-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Jianxue Wang, Weichao Wang, Xifan Wang, Haoyong Chen, Xiuli Wang |
Cooperative Co-evolutionary Approach Applied in Reactive Power Optimization of Power System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (1) ![In: Advances in Natural Computation, Second International Conference, ICNC 2006, Xi'an, China, September 24-28, 2006. Proceedings, Part I, pp. 620-628, 2006, Springer, 3-540-45901-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Steven Van Vaerenbergh, Javier Vía, Ignacio Santamaría |
Online Kernel Canonical Correlation Analysis for Supervised Equalization of Wiener Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2006, part of the IEEE World Congress on Computational Intelligence, WCCI 2006, Vancouver, BC, Canada, 16-21 July 2006, pp. 1198-1204, 2006, IEEE, 0-7803-9490-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Petra Povalej, Peter Kokol, Tatjana Welzer-Druzovec, Bruno Stiglic |
Machine-Learning with Cellular Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDA ![In: Advances in Intelligent Data Analysis VI, 6th International Symposium on Intelligent Data Analysis, IDA 2005, Madrid, Spain, September 8-10, 2005, Proceedings, pp. 305-315, 2005, Springer, 3-540-28795-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Mohammed A. Hasan |
Unconstrained functional criteria for canonical correlation analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (3) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 2317-2320, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Ran Canetti, Shai Halevi, Jonathan Katz |
Chosen-Ciphertext Security from Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 207-222, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Pierre-Alain Fouque, David Pointcheval |
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 351-368, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Chosen-Ciphertext Attacks, Threshold Cryptosystems |
43 | Chen-Wo Kuo, Jiann-Min Yang, Quo-Ping Lin, Maiga Chang |
E-Learning: The Strategies of Learning Culture and Arts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Edutainment ![In: Learning by Playing. Game-based Education System Design and Development, 4th International Conference on E-Learning and Games, Edutainment 2009, Banff, Canada, August 9-11, 2009. Proceedings, pp. 101-107, 2009, Springer, 978-3-642-03363-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
NPM, e-learning, culture, arts, CCA |
43 | Marian Bubak, Kamil Górka, Tomasz Gubala, Maciej Malawski, Katarzyna Zajac 0001 |
Automatic Flow Building for Component Grid Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPAM ![In: Parallel Processing and Applied Mathematics, 5th International Conference, PPAM 2003, Czestochowa, Poland, September 7-10, 2003. Revised Papers, pp. 804-811, 2003, Springer, 3-540-21946-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Grid computations, OGSA, CCA, workflow composition |
42 | Richard A. Kemmerer, Tad Taylor |
A Modular Covert Channel Analysis Methodology for Trusted DG/UXTM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 224-235, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
modular covert channel analysis methodology, Trusted DG/UX, CCA approach, subsystem architecture, DG/UX kernel, system state, abstract object, Ratings Maintenance Program, RAMP, SRM analysis, exported function, peer subsystems, kernel-wide SRM, commercial strength Unix system, operating system kernels, system calls, modular approach |
38 | Weilong Yang, Dong Yi, Zhen Lei 0001, Jitao Sang, Stan Z. Li |
2D-3D face matching using CCA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FG ![In: 8th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2008), Amsterdam, The Netherlands, 17-19 September 2008, pp. 1-6, 2008, IEEE Computer Society, 978-1-4244-2153-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Dan Boneh, Jonathan Katz |
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 87-103, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Public-key encryption, Identity-based encryption, Chosen-ciphertext security |
38 | Benjamin A. Allan, Sophia Lefantzi, Jaideep Ray |
ODEPACK++: Refactoring the LSODE Fortran Library for Use in the CCA High Performance Component Software Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIPS ![In: 9th International Workshop on High-Level Programming Models and Supportive Environments (HIPS 2004), 26 April 2004, Santa Fe, NM, USA, pp. 109-119, 2004, IEEE Computer Society, 0-7695-2151-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
parallel programming, object oriented, C++, FORTRAN, interface design, differential equations, software decomposition, common component architecture |
38 | M. Shahjahan, Kazuyuki Murase |
A Neural Learning Rule for CCA Approximation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP ![In: Neural Information Processing, 11th International Conference, ICONIP 2004, Calcutta, India, November 22-25, 2004, Proceedings, pp. 465-470, 2004, Springer, 3-540-23931-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Xiaoqi Jia, Jun Shao 0001, Jiwu Jing, Peng Liu 0005 |
CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 1299-1305, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Type-based proxy re-encryption, CCA security, invisible proxy |
33 | Jianchun Zhang, Daoqiang Zhang |
Canonical random correlation analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1111-1112, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
dimensionality reduction, discriminant, multi-view, canonical correlation analysis |
33 | Ashwin Natarajan, Ying Cai, Johnny Wong |
An enhanced client-centric approach for efficient video broadcast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 43(2), pp. 179-193, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Video on demand, Multimedia communication, Periodic broadcast, Service latency |
33 | Li Li 0009, Thomas Kunz |
Cooperative node localization using nonlinear data projection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 5(1), pp. 1:1-1:26, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
curvilinear component analysis, simulations, Localization, multi-dimensional scaling, nonlinear mapping |
33 | Seiko Arita, Koji Tsurudome |
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 186-200, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption |
33 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 276-292, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
33 | María del Rocío Gómez Díaz, Rodrigo Sandoval-Almazán |
Gestión del conocimiento estrategia de vinculación en los centros comunitarios de aprendizaje. ![Search on Bibsonomy](Pics/bibsonomy.png) |
D.GO ![In: Proceedings of the 10th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2009, Puebla, Mexico, May 17-20, 2009, pp. 134-142, 2009, Digital Government Research Center, 978-1-60558-535-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
centros comunitarios de aprendizaje, conocimiento explícito, conocimiento tácito, gestión del conocimiento |
33 | Tingkai Sun, Songcan Chen, Jing-Yu Yang, Pengfei Shi |
A Novel Method of Combined Feature Extraction for Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), December 15-19, 2008, Pisa, Italy, pp. 1043-1048, 2008, IEEE Computer Society, 978-0-7695-3502-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Leong Hou U, Man Lung Yiu, Kyriakos Mouratidis, Nikos Mamoulis |
Capacity constrained assignment in spatial databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 15-28, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
optimal assignment, spatial databases |
33 | Goichiro Hanaoka, Kaoru Kurosawa |
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 308-325, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Timothée Bailloeul, Cai-Zhi Zhu, Yinghui Xu |
Automatic image tagging as a random walk with priors on the canonical correlation subspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multimedia Information Retrieval ![In: Proceedings of the 1st ACM SIGMM International Conference on Multimedia Information Retrieval, MIR 2008, Vancouver, British Columbia, Canada, October 30-31, 2008, pp. 75-82, 2008, ACM, 978-1-60558-312-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
image retrieval, image annotation, local binary pattern, inverse document frequency |
33 | Tarik Taleb, Keisuke Ooi, Kazuo Hashimoto |
An Efficient Collision Avoidance Strategy for ITS systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 2212-2217, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Hsiang-Fu Yu, Hung-Chang Yang, Chu-Yi Chien, Yao-Tien Wang |
A Limited-Client-Capability Broadcasting Scheme for VoD Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 192-196, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
buffer, Periodic broadcasting, video-on-demand (VOD), cable TV |
33 | Sihan Qing, Changxiang Shen |
Design of secure operating systems with high security levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(3), pp. 399-418, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
secure operating systems with high security levels, covert channel analysis, architecture, security model |
33 | Mehmet Emre Sargin, Yücel Yemez, Engin Erzin, A. Murat Tekalp |
Audiovisual Synchronization and Fusion Using Canonical Correlation Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 9(7), pp. 1396-1403, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Chong Wang 0002 |
Variational Bayesian Approach to Canonical Correlation Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Neural Networks ![In: IEEE Trans. Neural Networks 18(3), pp. 905-910, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Jian Ma, Zengqi Sun |
Copula Component Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA ![In: Independent Component Analysis and Signal Separation, 7th International Conference, ICA 2007, London, UK, September 9-12, 2007., pp. 73-80, 2007, Springer, 978-3-540-74493-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Tae-Kyun Kim, Shu-Fai Wong, Roberto Cipolla |
Tensor Canonical Correlation Analysis for Action Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 18-23 June 2007, Minneapolis, Minnesota, USA, 2007, IEEE Computer Society, 1-4244-1179-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | José Alonso Ybáñez Zepeda, Franck Davoine, Maurice Charbit |
A linear estimation method for 3D pose and facial animation tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 18-23 June 2007, Minneapolis, Minnesota, USA, 2007, IEEE Computer Society, 1-4244-1179-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Sham M. Kakade, Dean P. Foster |
Multi-view Regression Via Canonical Correlation Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COLT ![In: Learning Theory, 20th Annual Conference on Learning Theory, COLT 2007, San Diego, CA, USA, June 13-15, 2007, Proceedings, pp. 82-96, 2007, Springer, 978-3-540-72925-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Bryan D. Thompson, Mahmood R. Azimi-Sadjadi |
An Iterative Learning Algorithm for Multi-Channel Coherence Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2007, Celebrating 20 years of neural networks, Orlando, Florida, USA, August 12-17, 2007, pp. 1326-1331, 2007, IEEE, 978-1-4244-1379-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Mustafa Karakoç, Adnan Kavak |
Stochastic Optimization Algorithm Based Dynamic Resource Assignment for 3G Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN ![In: Next Generation Teletraffic and Wired/Wireless Advanced Networking, 7th International Conference, NEW2AN 2007, St. Petersburg, Russia, September 10-14, 2007, Proceedings, pp. 223-234, 2007, Springer, 978-3-540-74832-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Joakim Rydell, Hans Knutsson, Magnus Borga |
Rotational Invariance in Adaptive fMRI Data Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 2841-2844, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Kenji Yoshihira |
Combining supervised and unsupervised monitoring for fault detection in distributed computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 705-709, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
supervised monitoring, distributed computing, fault detection, internet services, canonical correlation analysis |
33 | Michael Reiter, Rene Donner, Georg Langs, Horst Bischof |
3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (1) ![In: 18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong, China, pp. 425-428, 2006, IEEE Computer Society, 0-7695-2521-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Ryotaro Hayashi 0001, Keisuke Tanaka |
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 271-282, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Yen-Jen Chang |
An Alternative Real-Time Filter Scheme to Block Buffering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 19th International Conference on VLSI Design (VLSI Design 2006), 3-7 January 2006, Hyderabad, India, pp. 762-765, 2006, IEEE Computer Society, 0-7695-2502-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Nicholas Hopper |
On Steganographic Chosen Covertext Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings, pp. 311-323, 2005, Springer, 3-540-27580-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Petra Povalej, Mitja Lenic, Peter Kokol |
Improving Ensembles with Classificational Cellular Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2005, 6th International Conference, Brisbane, Australia, July 6-8, 2005, Proceedings, pp. 242-249, 2005, Springer, 3-540-26972-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Amir R. Razavi, Hans Gill, Hans Åhlfeldt, Nosrat Shahsavar |
A Data Pre-processing Method to Increase Efficiency and Accuracy in Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIME ![In: Artificial Intelligence in Medicine, 10th Conference on Artificial Intelligence in Medicine, AIME 2005, Aberdeen, UK, July 23-27, 2005, Proceedings, pp. 434-443, 2005, Springer, 3-540-27831-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Boyana Norris |
Software Architecture Issues in Scientific Component Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PARA ![In: Applied Parallel Computing, State of the Art in Scientific Computing, 7th International Workshop, PARA 2004, Lyngby, Denmark, June 20-23, 2004, Revised Selected Papers, pp. 629-636, 2004, Springer, 3-540-29067-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | David E. Bernholdt |
High-Performance Parallel and Distributed Scientific Computing with the Common Component Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part III, pp. 1, 2004, Springer, 3-540-22116-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Kaoru Kurosawa, Yvo Desmedt |
A New Paradigm of Hybrid Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, pp. 426-442, 2004, Springer, 3-540-22668-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
KEM, standard model, hybrid encryption |
33 | Hong-Yi Huang, Shih-Lun Chen |
Threshold triggers and accelerator for deep submicron interconnection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APCCAS (2) ![In: IEEE Asia Pacific Conference on Circuits and Systems 2002, APCCAS 2002, Singapore, 16-18 December 2002, pp. 143-146, 2002, IEEE, 0-7803-7690-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Pei Ling Lai, Colin Fyfe |
Kernel and Nonlinear Canonical Correlation Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN (4) ![In: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, IJCNN 2000, Neural Computing: New Challenges and Perspectives for the New Millennium, Como, Italy, July 24-27, 2000, Volume 4, pp. 614, 2000, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Da-Chuan Cheng, Kuo-Sheng Cheng, Arno Schmidt-Trucksäss, Markus Sandrock, Qin Pu, Hans Burkhardt |
Automatic Detection of the Intimal and the Adventitial Layers of the Common Carotid Artery Wall in Ultrasound B-Mode Images Using Snakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP ![In: 1oth International Conference on Image Analysis and Processing (ICIAP 1999), 27-29 September 1999, Venice, Italy, pp. 452-457, 1999, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
32 | Shanshan Li, Qun Wang |
DHPA: A New Distributed High Performance Architecture for Space Environment Modeling and Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 633-638, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Space environment, Simulation, High Performance Computing, CCA, Modeling Framework |
32 | Sanja Fidler, Danijel Skocaj, Ales Leonardis |
Combining Reconstructive and Discriminative Subspace Methods for Robust Classification and Regression by Subsampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 28(3), pp. 337-350, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
reconstructive methods, discriminative methods, robust classification, high-breakdown point classification, PCA, occlusion, outlier detection, LDA, Subspace methods, CCA, subsampling, robust regression |
32 | Dennis Gannon, Sriram Krishnan, Liang Fang, Gopi Kandaswamy, Yogesh Simmhan, Aleksander Slominski |
On Building Parallel & Grid Applications: Component Technology and Distributed Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 8(4), pp. 271-277, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
grid web services, XCAT, component framework, CCA |
32 | Yoshio Takane, Michael A. Hunter |
Constrained Principal Component Analysis: A Comprehensive Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 12(5), pp. 391-419, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
GSVD (generalized singular value decomposition), CALC, GMANOVA, Lagrange's theorem, CANO, CA (correspondence analysis), Projection, CCA |
32 | Jiangxia Ge, Tianshu Shan, Rui Xue 0001 |
On the Fujisaki-Okamoto transform: from Classical CCA Security to Quantum CCA Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 792, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
32 | James Chapman 0006, Hao-Ting Wang |
CCA-Zoo: A collection of Regularized, Deep Learning based, Kernel, and Probabilistic CCA methods in a scikit-learn style framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Open Source Softw. ![In: J. Open Source Softw. 6(68), pp. 3823, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Daniel Jost 0001, Christian Badertscher, Fabio Banfi |
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 135, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
32 | Hossam M. Farag, Aamir Mahmood, Mikael Gidlund, Patrik Österberg |
PR-CCA MAC: A Prioritized Random CCA MAC Protocol for Mission-Critical IoT Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: 2018 IEEE International Conference on Communications, ICC 2018, Kansas City, MO, USA, May 20-24, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-3180-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 3585 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|