|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2857 occurrences of 1570 keywords
|
|
|
Results
Found 9557 publication records. Showing 9482 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
121 | Willy Susilo, Yi Mu 0001 |
Non-interactive Deniable Ring Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 386-401, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Ring signature schemes, non-interactive, ring-to-ring authentication, deniable |
109 | Huaqun Wang, Futai Zhang, Yanfei Sun |
Cryptanalysis of a Generalized Ring Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 6(2), pp. 149-151, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
95 | Efstratios Thomopoulos, Louise E. Moser, P. M. Melliar-Smith |
Analyzing the latency of the Totem multicast protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), September 22-25, 1997 Las Vegas, NV, USA, pp. 42-50, 1997, IEEE Computer Society, 0-8186-8186-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Totem multicast protocols, multicast group communication protocols, latency analysis, reliable totally ordered delivery, logical token-passing ring, single-ring network, two-ring network, four-ring network, multiple-ring networks, mean latency, latency distribution, distributed systems, protocols, local area networks, LAN, probability density functions, gateways, protocols performance, message delivery, message filtering |
92 | M. A. Sarwar, Alan D. George, David E. Collins |
Reliability Modeling of SCI Ring-Based Topologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 126-134, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
SCI ring-based topologies, cluster interconnects, point-to-point ring-based interconnect, switched ring topologies, 1D k-ary n-cube switching fabrics, 2D k-ary n-cube switching fabrics, UltraSAN, single-ring system, redundant ring, fault tolerance, Petri nets, multiprocessor interconnection networks, network topology, reliability modeling, link failures, system buses, multiprocessor interconnects, scalable coherent interface |
91 | Joseph K. Liu, Willy Susilo, Duncan S. Wong |
Ring Signature with Designated Linkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 104-119, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
linkable ring signature, spontaneous group signature, ring signature |
86 | William Aiello, Sandeep N. Bhatt, Fan R. K. Chung, Arnold L. Rosenberg, Ramesh K. Sitaraman |
Augmented Ring Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 12(6), pp. 598-609, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
express rings, hierarchical ring networks, diameter trade-offs, graph embedding, Ring networks, multirings, chordal rings, grid graphs |
85 | Jian Ren 0001, Lein Harn |
Generalized Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 5(3), pp. 155-163, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
80 | Laxmi N. Bhuyan, Dipak Ghosal, Qing Yang 0001 |
Approximate Analysis of Single and Multiple Ring Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 38(7), pp. 1027-1040, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
asynchronous packet switched interconnection networks, single ring networks, multiple ring networks, register-insertion-ring protocols, uniform analysis, M/G/1 queuing model, symmetric ring structure, nonexhaustive service policy, infinite queue length, simulation, performance evaluation, performance evaluation, protocols, performance models, multiprocessor interconnection networks, packet switching, analytical models, multiprocessing, decentralized control, token-ring, slotted-ring, data-flow architectures |
74 | Jian Ren 0001, Lein Harn |
Ring Signature Based on ElGamal Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, First International Conference, WASA 2006, Xi'an, China, August 15-17, 2006, Proceedings, pp. 445-456, 2006, Springer, 3-540-37189-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Bingxue Yao, Yubin Zhong |
The Construction of Power Ring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFIE ![In: Fuzzy Information and Engineering, Proceedings of the Second International Conference of Fuzzy Information and Engineering, ICFIE 2007, May 13-16, 2007, Guangzhou, China, pp. 181-187, 2007, Springer, 978-3-540-71440-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
HX Rings, Power Ring, Regular Power Ring, Nontrivial HX Ring, Nontrivial Power Ring |
68 | Koutarou Suzuki, Fumitaka Hoshino, Tetsutaro Kobayashi |
Relinkable Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 518-536, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, pairing, ring signature |
68 | Dennis Y. W. Liu, Joseph K. Liu, Yi Mu 0001, Willy Susilo, Duncan S. Wong |
Revocable Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(6), pp. 785-794, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocability, ring signature |
68 | Gruia Calinescu, Peng-Jun Wan |
On Ring Grooming in optical networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comb. Optim. ![In: J. Comb. Optim. 13(2), pp. 103-122, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Ring grooming, Approximation algorithms, Matching |
68 | Eiichiro Fujisaki, Koutarou Suzuki |
Traceable Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 181-200, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
65 | Dongho Yoo, Inbum Jung, Seung Ryoul Maeng, Hyunglae Roh |
Multistage Ring Network: A New Multiple Ring Network for Large Scale Multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 290-294, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Multiple ring network, Interconnection network, Multiprocessors, Ring network |
62 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
On the Security of Identity Based Ring Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 310-325, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack |
62 | Hyun-Su Jang, Kwangsun Ko, Young-woo Jung, Young Ik Eom |
Overlay Ring Based Secure Group Communication Scheme for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II, pp. 302-313, 2009, Springer, 978-3-642-02456-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Group shared key, Mobile agents, Group communication, Ring topology |
62 | Lingling Wang, Guoyin Zhang, Chunguang Ma |
ID-based deniable ring authentication with constant-size signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. China ![In: Frontiers Comput. Sci. China 2(1), pp. 106-112, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
deniable ring authentication, constant-size signature, privacy, bilinear pairings, ID-based |
62 | Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen |
Escrowed Linkability of Ring Signatures and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 175-192, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
pairings, ring signature, identity-based, linkability |
62 | Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Ring Signature: Why, How and What Next. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 144-161, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
spontaneous anonymous group signature, bilinear pairings, PKI, Identity based cryptography, ring signature |
62 | Leonidas Georgiadis, Wojciech Szpankowski, Leandros Tassiulas |
A scheduling policy with maximal stability region for ring networks with spatial reuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 19(1-2), pp. 131-148, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Lyapunov, function method, scheduling, stability analysis, Ring networks, spatial reuse |
62 | Wei Gao 0007, Guilin Wang, Xueli Wang, Dongqing Xie |
Controllable Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 1-14, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
59 | Christian Scheideler |
How to spread adversarial nodes?: rotate! ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005, pp. 704-713, 2005, ACM, 1-58113-960-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
join-leave attacks, random mixing, proactive security |
56 | Narutoshi Umemoto, Hirotsugu Kakugawa, Masafumi Yamashita |
A Self-Stabilizing Ring Orientation Algorithm With a Smaller Number of Processor States. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 9(6), pp. 579-584, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
ring orientation, fault-tolerance, Distributed algorithm, self-stabilization, ring network |
56 | Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit |
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PQCrypto ![In: Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings, pp. 1-16, 2008, Springer, 978-3-540-88402-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Threshold ring signature, Stern’s Scheme, syndrome decoding, code-based cryptography |
56 | Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen |
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 364-378, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Anonymity, Revocable, Ring Signature, Linkable |
56 | Tommy Thomadsen, Thomas R. Stidsen |
Hierarchical Ring Network Design Using Branch-and-Price. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 29(1), pp. 61-76, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ring network design, hierarchical network design, branch-and-price |
56 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Threshold Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 218-232, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Threshold ring signature, spontaneity, anonymity, bilinear pairings, identity-based signature |
56 | Léonard Dallot, Damien Vergnaud |
Provably Secure Code-Based Threshold Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings, pp. 222-235, 2009, Springer, 978-3-642-10867-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
56 | Osamu Honda, Hiroyuki Ohsaki, Makoto Imase, Kazuhiro Matsuda |
Ring-Based Virtual Private Network Supporting a Large Number of VPNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Sixth International Conference on Networking (ICN 2007), 22-28 April 2007, Sainte-Luce, Martinique, France, pp. 33, 2007, IEEE Computer Society, 978-0-7695-2805-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
56 | Adam Bender, Jonathan Katz, Ruggero Morselli |
Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 60-79, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Amos Israeli, Marc Jalfon |
Self-Stabilizing Ring Orientation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WDAG ![In: Distributed Algorithms, 4th International Workshop, WDAG '90, Bari, Italy, September 24-26, 1990, Proceedings, pp. 1-14, 1990, Springer, 3-540-54099-7. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
53 | Zhao Cheng, Wendi Beth Heinzelman |
Flooding Strategy for Target Discovery in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 11(5), pp. 607-618, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
single/multi target discovery, mathematical induction, expansion ring |
50 | Dániel Horváth, Gábor Kapitány, Sándor Plósz, István Moldován, Csaba Lukovszki |
Ring Flushing for Reduced Overload in Spanning Tree Protocol Controlled Ethernet Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUNICE ![In: The Internet of the Future, 15th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2009, Barcelona, Spain, September 7-9, 2009. Proceedings, pp. 11-20, 2009, Springer, 978-3-642-03699-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ring flushing, rstp, spanning trees, Ethernet, flooding |
50 | Kazuki Yoneyama, Kazuo Ohta |
Ring signatures: universally composable definitions and constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 374-376, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anonymity, ring signature, universal composability, unforgeability |
50 | Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt |
Unconditionally secure ring authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 173-181, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ring signature, unconditional security, authentication codes |
50 | Stefan Dobrev, Nicola Santoro, Wei Shi 0001 |
Locating a Black Hole in an Un-oriented Ring Using Tokens: The Case of Scattered Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par ![In: Euro-Par 2007, Parallel Processing, 13th International Euro-Par Conference, Rennes, France, August 28-31, 2007, Proceedings, pp. 608-617, 2007, Springer, 978-3-540-74465-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Un-oriented, Mobile Agent, Anonymous, Asynchronous, Ring, Token, Scattered, Black Hole |
50 | Yung-Chiao Chen, Chuan-Ching Sue, Sy-Yen Kuo |
The Survivability of the Augmented Logical Ring Topology in WDM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 18-20 December, 2006, University of California, Riverside, USA, pp. 397-398, 2006, IEEE Computer Society, 0-7695-2724-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
failure propagation, problem link, Augmented Survivable Edges (ASE), logical ring topology, WDM |
50 | Fredrik Davik, Amund Kvalbein, Stein Gjessing |
Performance Evaluation and Improvement of Non-stable Resilient Packet Ring Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II, pp. 551-563, 2005, Springer, 3-540-25338-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Resilient Packet Ring, Next generation protocol design and evaluation, Next Generation Networks Principles, Simulations, Performance evaluation, Fairness, High-speed Networks, Communications modeling |
50 | Jean-Claude Bermond, Sébastien Choplin, Stephane Perennes |
Hierarchical Ring Network design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theory Comput. Syst. ![In: Theory Comput. Syst. 36(6), pp. 663-682, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Combinatorial Optimization, Network Design, Diameter, Ring Networks |
50 | Adam Bender, Jonathan Katz, Ruggero Morselli |
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 22(1), pp. 114-138, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Anonymity, Signatures |
50 | Michael Scheutzow, Martin Reisslein, Martin Maier 0001, Patrick Seeling |
Multicast Capacity of Packet-Switched Ring WDM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(2), pp. 623-644, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Michael Scheutzow, Patrick Seeling, Martin Maier 0001, Martin Reisslein |
Multicast capacity of packet-switched ring WDM networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 706-717, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Hyo-Sik Yang, Martin Herzog, Martin Maier 0001, Martin Reisslein |
Metro WDM networks: performance comparison of slotted ring and AWG star networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 22(8), pp. 1460-1473, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Willy Susilo, Yi Mu 0001 |
Deniable Ring Authentication Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 149-163, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Mario Baldi, Yoram Ofek |
A comparison of ring and tree embedding for real-time group multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 11(3), pp. 451-464, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
multicast channels, real-time system, synchronization, timing, computer networks, multimedia systems, multimedia communications, flow control, communication systems |
50 | Chunsheng Li, Chengqi Zhang, Longbing Cao |
Theoretical Evaluation of Ring-Based Architectural Model for Middle Agents in Agent-Based System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 14th International Symposium, ISMIS 2003, Maebashi City, Japan, October 28-31, 2003, Proceedings, pp. 603-607, 2003, Springer, 3-540-20256-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Jaap-Henk Hoepman |
Uniform Deterministic Self-Stabilizing Ring-Orientation on Odd-Length Rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WDAG ![In: Distributed Algorithms, 8th International Workshop, WDAG '94, Terschelling, The Netherlands, September 29 - October 1, 1994, Proceedings, pp. 265-279, 1994, Springer, 3-540-58449-8. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Communication, Synchronization, Shared Memory, Self-Stabilization, Orientation, Rings, Symmetry Breaking |
48 | Jingjing Ma, Piotr J. Wojciechowski |
F*-Rings Are O*. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Order ![In: Order 17(2), pp. 125-128, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
F *-ring, lattice-ordered ring, O *-ring |
47 | Karim Boulabiar |
Positive Derivations on Archimedean Almost f-Rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Order ![In: Order 19(4), pp. 385-395, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
almost f-ring, Archimedean, f-ring, positive derivation |
47 | Tomasz Brzezinski, Ryan B. Turner |
The Galois Theory of Matrix C-rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Categorical Struct. ![In: Appl. Categorical Struct. 14(5-6), pp. 471-501, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 16W30 |
47 | Joel J. P. C. Rodrigues, Mário M. Freire, Pascal Lorenz |
Performance Assessment of Optical Burst Switching Ring and Chordal Ring Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 27(2-4), pp. 133-149, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
optical Internet, performance, optical burst switching, signaling protocols |
47 | Joo Beom Yun, Seong Tae Jhang, Chu Shik Jhon, Cheol Won Lee |
Analysis of System Performance by Changing the Ring Architecture on the Dual Ring CC-NUMA System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 9th International Conference on Parallel and Distributed Systems, ICPADS 2002, Taiwan, ROC, December 17-20, 2002, pp. 103-, 2002, IEEE Computer Society, 0-7695-1760-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Mee Yee Chan, Francis Y. L. Chin |
Optimal Resilient Distributed Algorithms for Ring Election. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 4(4), pp. 475-480, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
ring election, dynamic ring, processorrecoveries, computational complexity, distributed algorithms, multiprocessing systems, system recovery, message complexity |
44 | Tong Zhang 0007, Chee Keat Fong, Linxing Xiao, Jie Zhou 0001 |
Automatic and instant ring tone generation based on music structure analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 17th International Conference on Multimedia 2009, Vancouver, British Columbia, Canada, October 19-24, 2009, pp. 593-596, 2009, ACM, 978-1-60558-608-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
music browsing, music repetition detection, music structure analysis, ring tone generation, voice detection |
44 | Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen |
Certificate Based (Linkable) Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 79-92, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Certificate Based, Ring Signature, Linkability |
44 | Lei Zhang 0009, Futai Zhang, Wei Wu 0001 |
A Provably Secure Ring Signature Scheme in Certificateless Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings, pp. 103-121, 2007, Springer, 978-3-540-75669-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Random Oracle model, Ring Signature, Certificateless Cryptography |
44 | Thayse Christine S. Dias, Gilberto Farias de Sousa Filho, Elder M. Macambira, Lucídio dos Anjos F. Cabral, Marcia Helena Costa Fampa |
An Efficient Heuristic for the Ring Star Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEA ![In: Experimental Algorithms, 5th International Workshop, WEA 2006, Cala Galdana, Menorca, Spain, May 24-27, 2006, Proceedings, pp. 24-35, 2006, Springer, 3-540-34597-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ring star problem, heuristics, network design, GRASP, VNS |
44 | Yawen Chen 0001, Hong Shen 0001, Haibo Zhang 0001 |
Hypercube Communications on Optical Chordal Ring Networks with Chord Length of Three. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia-Pacific Computer Systems Architecture Conference ![In: Advances in Computer Systems Architecture, 11th Asia-Pacific Conference, ACSAC 2006, Shanghai, China, September 6-8, 2006, Proceedings, pp. 337-343, 2006, Springer, 3-540-40056-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
hypercube communication, Wavelength Division Multiplexing (WDM), routing and wavelength assignment(RWA), chordal ring |
44 | Tomoko Kajiyama, Noriko Kando, Shin'ichi Satoh 0001 |
Examination and enhancement of a ring-structured graphical search interface based on usability testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: SIGIR 2005: Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Salvador, Brazil, August 15-19, 2005, pp. 623-624, 2005, ACM, 1-59593-034-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
concentric ring view, personal history, relevance feedback, filtering, browsing, search interface |
44 | Joseph K. Liu, Duncan S. Wong |
On the Security Models of (Threshold) Ring Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 204-217, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Anonymity, Security Models, Bilinear Maps, Ring Signature |
44 | Du-Ming Tsai, Ya-Hui Tsai |
Defect detection in textured surfaces using color ring-projection correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Vis. Appl. ![In: Mach. Vis. Appl. 13(4), pp. 194-200, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Ring projection, Correlation, Defect detection, Surface inspection, Colored textures |
44 | Ugur Kalay, Marek A. Perkowski, Douglas V. Hall |
Highly Testable Boolean Ring Logic Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMVL ![In: 29th IEEE International Symposium on Multiple-Valued Logic, ISMVL 1999, Freiburg im Breisgau, Germany, May 20-22, 1999, Proceedings, pp. 268-274, 1999, IEEE Computer Society, 0-7695-0161-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Boolean Ring Circuits, Easily Testable Multiple-Valued Logic Circuits, Binary Implementation of MVL Circuits |
44 | Tibor Jager, Jörg Schwenk |
On the Analysis of Cryptographic Assumptions in the Generic Ring Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 399-416, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Hai Zhuge, Xiaoping Sun |
A Virtual Ring Method for Building Small-World Structured P2P Overlays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 20(12), pp. 1712-1725, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Karin Strauss, Xiaowei Shen, Josep Torrellas |
Uncorq: Unconstrained Snoop Request Delivery in Embedded-Ring Multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 40th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-40 2007), 1-5 December 2007, Chicago, Illinois, USA, pp. 327-342, 2007, IEEE Computer Society, 0-7695-3047-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Nishanth Chandran, Jens Groth, Amit Sahai |
Ring Signatures of Sub-linear Size Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings, pp. 423-434, 2007, Springer, 978-3-540-73419-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Jianhong Zhang |
An Efficient Identity-Based Ring Signature Scheme and Its Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 63-74, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Michael R. Marty, Mark D. Hill |
Coherence Ordering for Ring-based Chip Multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-39 2006), 9-13 December 2006, Orlando, Florida, USA, pp. 309-320, 2006, IEEE Computer Society, 0-7695-2732-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Ronald L. Rivest, Adi Shamir, Yael Tauman |
How to Leak a Secret: Theory and Applications of Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Essays in Memory of Shimon Even ![In: Theoretical Computer Science, Essays in Memory of Shimon Even, pp. 164-186, 2006, Springer, 3-540-32880-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Jin Li 0002, Xiaofeng Chen 0001, Tsz Hon Yuen, Yanming Wang |
Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 545-555, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Moni Naor |
Deniable Ring Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 481-498, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Mohammad S. Obaidat, Mohammad A. Al-Rousan |
MTR: A Modified Token Ring Protocol and Its Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Conference on Computer Science ![In: Proceedings of the ACM 20th Annual Conference on Computer Science, CSC '92, Kansas City, MO, USA, March 3-5, 1992, pp. 261-266, 1992, ACM, 0-89791-472-4. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
44 | Kenneth C. Sevcik, Marjory J. Johnson |
Cycle Time Properties of the FDDI Token Ring Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 1986 ACM SIGMETRICS joint international conference on Computer performance modelling, measurement and evaluation, North Carolina, State University, USA, May 28-30, 1986, pp. 109-110, 1986, ACM, 0-89791-184-9. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
41 | Saurabh Agarwal, Gudmund Skovbjerg Frandsen |
A New GCD Algorithm for Quadratic Number Rings with Unique Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LATIN ![In: LATIN 2006: Theoretical Informatics, 7th Latin American Symposium, Valdivia, Chile, March 20-24, 2006, Proceedings, pp. 30-42, 2006, Springer, 3-540-32755-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
quadratic number ring, quadratic form reduction, gcd |
41 | Ronald L. Rivest, Adi Shamir, Yael Tauman |
How to Leak a Secret. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 552-565, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
ring signature scheme, signer-ambiguous signature scheme, designated verifier signature scheme, signature scheme, group signature scheme |
41 | Ching-Liang Su |
Original Finger Image Extraction by Morphological Technique and Finger Image Comparisons for Persons' Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 45(1), pp. 1-14, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
finger shape extraction, finger shape identification, object curve comparison, morphology, dilating |
41 | Sushil K. Singh, Viet L. Do, Kevin W. James, Kenneth Y. Yun, Rene L. Cruz, Manish Amde |
QoS Enabled Broadband Access Through Optical Rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 16-18 November 2004, Tampa, FL, USA, Proceedings, pp. 421-422, 2004, IEEE Computer Society, 0-7695-2260-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Duane S. Boning, Joseph Panganiban, Karen Gonzalez-Valentin, Sani R. Nassif, Chandler McDowell, Anne E. Gattiker, Frank Liu 0001 |
Test structures for delay variability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Timing Issues in the Specification and Synthesis of Digital Systems ![In: Proceedings of the 8th ACM/IEEE International Workshop on Timing Issues in the Specification and Synthesis of Digital Systems, Monterey, California, USA, December 2-3, 2002, pp. 109, 2002, ACM, 1-58113-526-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Isaac Yi-Yuan Lee, Sheng-De Wang |
Ring-Connected Networks and Their Relationship to Cubical Ring Connected Cycles and Dynamic Redundancy Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 6(9), pp. 988-996, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
multiple-fault tolerant, ring-connected network, interconnection network, hypercubic networks, Butterfly, circulant graph, cube-connected cycle, graph automorphism |
41 | Xiaoshe Dong, Tomohiro Kudoh, Hideharu Amano |
Wavelength Division Multiple Access Ring - Virtual Topology on a Simple Ring Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 1997 International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN '97), 18-20 December 1997, Taipei, Taiwan, pp. 30-36, 1997, IEEE Computer Society, 0-8186-8259-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
wavelength division multiple access (WDMA), interconnection network, parallel machine, routing algorithm, optical communication |
38 | Graham H. Norton, Ana Salagean |
On the Structure of Linear and Cyclic Codes over a Finite Chain Ring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 10(6), pp. 489-506, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Finite chain ring, Linear code, Galois ring, Cyclic code |
38 | Robert R. Henry 0002 |
A multicast ATM switch with slotted ring fabric. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), September 22-25, 1997 Las Vegas, NV, USA, pp. 500-503, 1997, IEEE Computer Society, 0-8186-8186-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
multicast ATM switch, slotted ring fabric, slotted ring ATM switch architecture, optical fiber switch, deterministic performance analysis equations, delay performance, zero blocking performance, 150 Mbit/s, asynchronous transfer mode, switching fabric |
38 | Amiya Nayak, Nicola Santoro, Quanhu Xue |
Ring reconfiguration in presence of close fault cuts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 1996 International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN '96), June 12-14, 1996, Beijing, China, pp. 422-428, 1996, IEEE Computer Society, 0-8186-7460-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
close fault cuts, subring formation, reconfiguration technique, chordal ring networks, ring reconfiguration, fault tolerance, fault tolerant computing, multiprocessor interconnection networks, reconfigurable architectures |
38 | Hung-Pin Chiu 0001, Din-Chang Tseng, Jen-Chieh Cheng |
Invariant handwritten Chinese character recognition using weighted ring-data matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Third International Conference on Document Analysis and Recognition, ICDAR 1995, August 14 - 15, 1995, Montreal, Canada. Volume I, pp. 116-119, 1995, IEEE Computer Society, 0-8186-7128-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
invariant handwritten Chinese character recognition, weighted ring-data matrix, translation-invariant normalization process, 1-fork point, multi-fork point, preclassification, weighted mean ring-data matrix, performance evaluation, character recognition, handwriting recognition, fuzzy membership function, corner point |
38 | Hyeongmook Lee, Woontack Woo |
Tangible spin cube for 3D ring menu in real space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Extended Abstracts Volume, Atlanta, Georgia, USA, April 10-15, 2010, pp. 4147-4152, 2010, ACM, 978-1-60558-930-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
3D ring menu, augmented reality, tangible UI |
38 | Huaqun Wang, Hong Yu |
Cryptanalysis of Two Ring Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 41-46, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography |
38 | Thierry Eido, Tuan-Dung Nguyen, Tülin Atmaca, Dominique Chiaroni |
Performance of Optical Ring Architectures with Variable-Size Packets: In-Line Buffers vs Semi-synchronous and Asynchronous Transparent MAC Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FITraMEn ![In: Traffic Management and Traffic Engineering for the Future Internet, First Euro-NF Workshop, FITraMEn 2008, Porto, Portugal, December 11-12, Revised Selected Papers, pp. 169-184, 2008, Springer, 978-3-642-04575-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Optical Metro Access Ring Networks, Optical Packet Switching (OPS), Variable-Size Packet Format, Performance Analysis, MAC Protocols |
38 | Ralf Klasing, Adrian Kosowski, Alfredo Navarra |
Taking Advantage of Symmetries: Gathering of Asynchronous Oblivious Robots on a Ring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedings, pp. 446-462, 2008, Springer, 978-3-540-92220-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Oblivious robots, Gathering problem, Mobile robots, Asynchronous system, Ring |
38 | XiuPing Han, JunAn Lu |
The changes on synchronizing ability of coupled networks from ring networks to chain networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(4), pp. 615-624, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
synchronizing ability, unidirectional couplings, bidirectional couplings, coupling matrix, complex networks, ring, chain |
38 | Mauricio Cerda, Nancy Hitschfeld-Kahler, Domingo Mery |
Robust Tree-Ring Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PSIVT ![In: Advances in Image and Video Technology, Second Pacific Rim Symposium, PSIVT 2007, Santiago, Chile, December 17-19, 2007, Proceedings, pp. 575-585, 2007, Springer, 978-3-540-77128-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
dendrology, tree-ring, hough transform |
38 | Ralf Klasing, Euripides Markou, Andrzej Pelc |
Gathering Asynchronous Oblivious Mobile Robots in a Ring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 17th International Symposium, ISAAC 2006, Kolkata, India, December 18-20, 2006, Proceedings, pp. 744-753, 2006, Springer, 3-540-49694-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mobile robot, asynchronous, ring, gathering |
38 | Yiqun Chen, Willy Susilo, Yi Mu 0001 |
Identity-based anonymous designated ring signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 189-194, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, ad-hoc networks, peer-to-peer, anonymity, ring signature, identity-based |
38 | Javier Herranz, Fabien Laguillaumie |
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 117-130, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
blind ring signatures, e-cash systems, provable security |
38 | Roberto Therón |
Hierarchical-Temporal Data Visualization Using a Tree-Ring Metaphor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Smart Graphics ![In: Smart Graphics, 6th International Symposium, SG 2006, Vancouver, Canada, July 23-25, 2006, Proceedings, pp. 70-81, 2006, Springer, 3-540-36293-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
tree-ring layout, information visualization, focus + context |
38 | Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen |
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 502-512, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fair partitioning, anonymity, bilinear pairing, Ring signature, threshold signature |
38 | Fangguo Zhang, Kwangjo Kim |
ID-Based Blind Signature and Ring Signature from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 533-547, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Provably security, Bilinear pairings, Blind signature, Ring signature, ID-based cryptography |
38 | Fadi N. Sibai |
Optimal Clustering of Hierarchical Hyper-Ring Multicomputers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 14(1), pp. 53-76, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
hierarchical ring networks, scalable and hierarchical multicomputer topologies, performance evaluation, networks of workstations, computer clusters |
38 | Yeshik Shin, Jin-su Ahn, Hyung-Rok Lee, Deog-Kyoon Jeong |
Design and Implementation of OTCA MAC Protocol for High-Speed Point-to-Point Ring Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 23rd Conference on Local Computer Networks, Boston, Massachusetts, USA, October 11-14, 1998, pp. 345-352, 1998, IEEE Computer Society, 0-8186-8810-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Ownership-tagged cell allocation, RingLink, MAC protocol, Ring network |
38 | Yu-Chee Tseng, Shu-Hui Chang, Jang-Ping Sheu |
Fault-Tolerant Ring Embedding in a Star Graph with Both Link and Node Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 8(12), pp. 1185-1195, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Fault tolerance, interconnection network, ring, Hamiltonian cycle, graph embedding, processor allocation, star graph |
Displaying result #1 - #100 of 9482 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|