|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 20184 occurrences of 7126 keywords
|
|
|
Results
Found 37120 publication records. Showing 37120 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
55 | Markus Michels, Markus Stadler |
Generic Constructions for Secure and Efficient Confirmer Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 406-421, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Designated confirmer signature schemes, undeniable signature schemes, provable security, commitment schemes |
48 | Amos Korman |
General compact labeling schemes for dynamic trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 20(3), pp. 179-193, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Distributed algorithms, Dynamic networks, Labeling schemes, Routing schemes |
48 | Rémi Abgrall, Philip L. Roe |
High Order Fluctuation Schemes on Triangular Meshes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 19(1-3), pp. 3-36, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
upwind stabilized schemes, hyperbolic problems, residual distributive schemes, finite elements, high order schemes |
46 | Sergio Cabello, Carles Padró, Germán Sáez |
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCT ![In: Fundamentals of Computation Theory, 12th International Symposium, FCT '99, Iasi, Romania, August 30 - September 3, 1999, Proceedings, pp. 185-194, 1999, Springer, 3-540-66412-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Detection of cheaters, Robust and secure schemes, Cryptography, Secret sharing schemes |
44 | Pierre Fraigniaud, Amos Korman |
On randomized representations of graphs using short labels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: SPAA 2009: Proceedings of the 21st Annual ACM Symposium on Parallelism in Algorithms and Architectures, Calgary, Alberta, Canada, August 11-13, 2009, pp. 131-137, 2009, ACM, 978-1-60558-606-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
adjacency labeling schemes, ancestry labeling schemes, probabilistic embeddings, universal graphs, distributed algorithms |
42 | Tatsuro Ito, Kenichiro Tanabe, Paul M. Terwilliger |
Some algebra related to P- and Q-polynomial association schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 167-192, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
42 | Paul Camion |
Codes over Zpn and association schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 59-86, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
42 | Wai Yin Mok |
A Comparative Study of Various Nested Normal Forms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 14(2), pp. 369-385, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
nested relation schemes, nested database schemes, nested databases, nested normal forms, conflict-free sets of MVDs, acyclic database schemes, nested database design, design flexibility, algorithms, object-relational databases, nested relations, data redundancy, object-relational database management systems, SQL:1999 |
41 | Vanesa Daza, Javier Herranz, Germán Sáez |
Protocols useful on the Internet from distributed signature schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 3(2), pp. 61-69, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Distributed signatures, Metering schemes, Distributed key distribution schemes |
40 | P. H. Muir |
Optimal discrete and continuous mono-implicit Runge-Kutta schemes for BVODEs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Comput. Math. ![In: Adv. Comput. Math. 10(2), pp. 135-167, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Runge-Kutta schemes, boundary value ODEs, efficiency, 65L05, 65L10 |
39 | James H. Anderson, Rohit Jain, Srikanth Ramamurthy |
Wait-free object-sharing schemes for real-time uniprocessors and multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTSS ![In: Proceedings of the 18th IEEE Real-Time Systems Symposium (RTSS '97), December 3-5, 1997, San Francisco, CA, USA, pp. 111-122, 1997, IEEE Computer Society, 0-8186-8268-X. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
wait-free object-sharing schemes, real-time uniprocessors, real-time multiprocessors, priority inheritance protocol, breakdown utilization experiments, lock-based schemes, multiprocessing systems, nonblocking, user level, priority ceiling protocol |
37 | Seiko Arita, Koji Tsurudome |
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 186-200, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption |
37 | Amos Korman, David Peleg |
Compact separator decompositions in dynamic trees and applications to labeling schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 21(2), pp. 141-161, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Informative labeling schemes, Distributed algorithms, Dynamic networks, Graph decompositions, Routing schemes |
37 | Rémi Abgrall, F. Marpeau |
Residual Distribution Schemes on Quadrilateral Meshes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 30(1), pp. 131-175, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
residual distribution schemes, structured and hybrid meshes, non oscillatory schemes, Conservation laws |
37 | Amos Korman, David Peleg |
Compact Separator Decompositions in Dynamic Trees and Applications to Labeling Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings, pp. 313-327, 2007, Springer, 978-3-540-75141-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
informative labeling schemes, Distributed algorithms, dynamic networks, graph decompositions, routing schemes |
37 | Gabriella Puppo, Giovanni Russo 0001 |
Staggered Finite Difference Schemes for Conservation Laws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 27(1-3), pp. 403-418, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
balance laws, central schemes, Conservation laws, high-order accuracy, finite difference schemes |
37 | Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe |
Mutually Trusted Authority-Free Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 10(4), pp. 261-289, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Key words, Secret sharing schemes, Secret sharing schemes |
36 | Alexander Barg, Simon Litsyn (eds.) |
Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![DIMACS/AMS, 978-0-8218-2074-2 The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Ilia Krasikov, Simon Litsyn |
Survey of binary Krawtchouk polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 199-211, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | |
Preface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. ix-, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
36 | Peter G. Boyvalenkov, Danyo Danev, Peter Kazakov |
Indexes of spherical codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 47-57, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Laurent Habsieger |
Integral zeroes of Krawtchouk polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 151-165, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Philippe Gaborit, W. Cary Huffman, Jon-Lark Kim, Vera Pless |
On additive GF(4) codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 135-149, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | William J. Martin |
Design systems: Combinatorial characterizations of Delsarte $\mathcal T$-designs via partially ordered sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 223-239, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Alexander Barg, David B. Jaffe |
Numerical results on the asymptotic rate of binary codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 25-32, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Christine Bachoc |
Harmonic weight enumerators of nonbinary codes and MacWilliams identities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 1-23, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Claude Carlet, Philippe Guillot |
Bent, resilient functions and the numerical normal form. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 87-96, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Tuvi Etzion |
On perfect codes in the Johnson scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 125-130, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Tero Laihonen |
On an algebraic method for bounding the covering radius. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 213-221, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | |
Foreword. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. xi-, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
36 | Tuvi Etzion, Jack H. van Lint |
On perfect constant weight codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 131-134, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Ulrich Tamm |
Communication complexity and orthogonal polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 277-285, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Jürgen Bierbrauer, Holger Schellwat |
Weakly biased arrays, almost independent arrays and error-correcting codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 33-46, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Italo J. Dejter, Kevin T. Phelps |
Ternary Hamming and binary perfect covering codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 111-113, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Gérard D. Cohen, Iiro S. Honkala, Antoine Lobstein, Gilles Zémor |
On identifying codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 97-109, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Ilia Krasikov |
Bounds for the Christoffel-Darboux kernel of the binary Krawtchouk polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 193-198, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Irfan Siap, Nuh Aydin, Dijen K. Ray-Chaudhuri |
New 1-generator quasi-twisted codes over GF(5). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 265-275, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Iwan M. Duursma |
A Riemann hypothesis analogue for self-dual codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 115-124, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Alexei E. Ashikhmin, Alexander Barg, Simon Litsyn |
Estimates of the distance distribution of nonbinary codes, with applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 287-301, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Mikhail E. Muzychuk, Mikhail H. Klin, Reinhard Pöschel |
The isomorphism problem for circulant graphs via Schur ring theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Codes and Association Schemes ![In: Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999, pp. 241-264, 1999, DIMACS/AMS, 978-0-8218-2074-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
35 | Chun-Yuan Lin, Yeh-Ching Chung |
Data distribution schemes of sparse arrays on distributed memory multicomputers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 41(1), pp. 63-87, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data distribution schemes, Data compression methods, Sparse ratio, Distributed memory multicomputers, Partition methods |
35 | Guomin Yang, Jing Chen 0001, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang 0002 |
A More Natural Way to Construct Identity-Based Identification Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 307-322, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Concurrent attacks, Identity-based cryptography, Identification schemes |
35 | Ronan Cummins, Colm O'Riordan |
Evolving General Term-Weighting Schemes for Information Retrieval: Tests on Larger Collections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 24(3-4), pp. 277-299, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
information retrieval, genetic programming, term-weighting schemes |
35 | Mark D. Gross, Ellen Yi-Luen Do |
Diagram query and image retrieval in design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings 1995 International Conference on Image Processing, Washington, DC, USA, October 23-26, 1995, pp. 308-311, 1995, IEEE Computer Society, 0-8186-7310-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
architectural CAD, diagram query, architectural education, visual references, key word retrieval schemes, texture retrieval schemes, color retrieval schemes, shape based retrieval, free hand drawing, Drawing Analogies, diagram keys, architecture, digital libraries, query processing, image retrieval, image recognition, educational technology, visual databases, image indexing, architectural designers, conceptual design, creative design, visual images |
35 | Sandra Pieraccini, Gabriella Puppo |
Implicit-Explicit Schemes for BGK Kinetic Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 32(1), pp. 1-28, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
BGK model, kinetic equations, implicit-explicit schemes, high-order schemes |
33 | Hao Chen 0095 |
Efficient compromising resilient authentication schemes for large scale wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 49-54, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
code and function based authentication schemes, polynomial based authentication scheme, wireless sensor netowork |
33 | Chun-Yuan Lin, Yeh-Ching Chung, Jen-Shiuh Liu |
Efficient Data Distribution Schemes for EKMR-Based Sparse Arrays on Distributed Memory Multicomputers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 34(3), pp. 291-313, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
data distribution schemes, data compression methods, sparse ratio, partition methods, Karnaugh map |
33 | Pim Tuyls, Henk D. L. Hollmann, Jack H. van Lint, Ludo M. G. M. Tolhuizen |
XOR-based Visual Cryptography Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 37(1), pp. 169-186, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Threshold visual secret sharing schemes, XOR, MDS codes |
33 | Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish |
Versatile padding schemes for joint signature and encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 344-353, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption |
32 | Rosa Donat, Pep Mulet |
Characteristic-Based Schemes for Multi-Class Lighthill-Whitham-Richards Traffic Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 37(3), pp. 233-250, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multi-class Lighthill Whitham Richards traffic model, High resolution shock capturing schemes, Finite-difference WENO schemes, Adaptive mesh refinement |
32 | Akinori Kawachi, Keisuke Tanaka, Keita Xagawa |
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 372-389, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
concurrent security, ad hoc anonymous identification schemes, identification schemes, Lattice-based cryptography |
32 | Amos Korman, Shay Kutten |
Labeling Schemes with Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIROCCO ![In: Structural Information and Communication Complexity, 14th International Colloquium, SIROCCO 2007, Castiglioncello, Italy, June 5-8, 2007, Proceedings, pp. 109-123, 2007, Springer, 978-3-540-72918-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
distance queries, Labeling schemes, routing schemes |
32 | Tapan K. Sengupta, S. K. Sircar, Anurag Dipankar |
High Accuracy Schemes for DNS and Acoustics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 26(2), pp. 151-193, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Computational acoustics, compact difference schemes, dispersion relation preservation schemes, DNS, time discretization |
32 | Jaume Martí-Farré, Carles Padró |
Secret Sharing Schemes on Access Structures with Intersection Number Equal to One. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 354-363, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
ideal schemes, Cryptography, secret sharing schemes, information rate |
32 | Jovan Dj. Golic |
On Matroid Characterization of Ideal Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(2), pp. 75-86, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Matroids, Matroids, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Access structures, Access structures |
31 | Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt |
Efficient Constructions of Signcryption Schemes and Signcryption Composability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 321-342, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-user security, signcryption, generic construction |
31 | Birgit Pfitzmann |
Sorting Out Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993., pp. 74-85, 1993, ACM, 0-89791-629-8. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
31 | David T. Harper III |
Block, Multistride Vector, and FFT Accesses in Parallel Memory Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 2(1), pp. 43-51, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
dynamic storage schemes, parallel memory performance, vectoraccesses, block accesses, constant-geometry FFT accesses, linear addresstransformations, XOR schemes, analytical results, bufferingeffects, pipelined memory systems, memory bank cycle time, fastFourier transforms, fast Fourier transform, memory architecture, quantitative analysis, conflict-free access |
31 | Oriol Farràs, Jaume Martí-Farré, Carles Padró |
Ideal Multipartite Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 448-465, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Ideal access structures, Multipartite secret sharing, Multipartite matroids, Discrete polymatroids, Secret sharing, Ideal secret sharing schemes |
31 | Stelvio Cimato, Roberto De Prisco, Alfredo De Santis |
Optimal Colored Threshold Visual Cryptography Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 35(3), pp. 311-335, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
visual crytography, secret sharing schemes |
31 | Jean-Paul Chehab, Bruno Costa 0002 |
Time Explicit Schemes and Spatial Finite Differences Splittings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 20(2), pp. 159-189, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
incremental unknowns, multilevel schemes, Burgers equation, stability, finite differences |
31 | Maarten van Veen, Fred Mulder, Karel Lemmen |
What is lacking in curriculum schemes for computing/informatics? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 9th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2004, Leeds, UK, June 28-30, 2004, pp. 186-190, 2004, ACM, 1-58113-836-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
curriculum implementation, curriculum research and development, curriculum schemes, curriculum theory, computing, informatics |
31 | Karthikeyan Duraisamy, James D. Baeder, Jian-Guo Liu 0006 |
Concepts and Application of Time-Limiters to High Resolution Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 19(1-3), pp. 139-162, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
high resolution schemes, non-linear time integration, time-limiting |
31 | Brian King |
Requirements for Group Independent Linear Threshold Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 89-106, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
linear secret sharing, group independent linear threshold schemes, monotone span programs and bounds on share size, secret sharing, threshold cryptography |
31 | Chun-Yuan Lin, Yeh-Ching Chung, Jen-Shiuh Liu |
Data Distribution Schemes of Sparse Arrays on Distributed Memory Multicomputers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 20-23 August 2002, Vancouver, BC, Canada, pp. 551-558, 2002, IEEE Computer Society, 0-7695-1680-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Data distribution schemes, Data compression methods, Sparse ratio, distributed memory multicomputers, Partition methods |
31 | Michel Abdalla, Sara K. Miner, Chanathip Namprempre |
Forward-Secure Threshold Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 441-456, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
proactive cryptography, forward security, threshold cryptography, signature schemes |
31 | Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson |
Dynamic Multi-threshold Metering Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings, pp. 130-143, 2000, Springer, 3-540-42069-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Metering Schemes, Security, Cryptography, Entropy |
30 | Sergio Amat, Sonia Busquier, Juan Carlos Trillo |
On multiresolution schemes using a stencil selection procedure: applications to ENO schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Numer. Algorithms ![In: Numer. Algorithms 44(1), pp. 45-68, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) 41A05, 65D05, 65D17, 41A10 |
30 | Jaume Martí-Farré, Carles Padró |
Secret Sharing Schemes with Three or Four Minimal Qualified Subsets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 34(1), pp. 17-34, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ideal schemes, cryptography, secret sharing schemes, information rate |
29 | Chenggui Zhao, Wenjun Xiao, Yong Qin |
Hybrid Diffusion Schemes for Load Balancing on OTIS-Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Algorithms and Architectures for Parallel Processing, 7th International Conference, ICA3PP 2007, Hangzhou, China, June 11-14, 2007, Proceedings, pp. 421-432, 2007, Springer, 978-3-540-72904-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Sundeep Narravula, Hyun-Wook Jin, Karthikeyan Vaidyanathan, Dhabaleswar K. Panda 0001 |
Designing Efficient Cooperative Caching Schemes for Multi-Tier Data-Centers over RDMA-enabled Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 16-19 May 2006, Singapore, pp. 401-408, 2006, IEEE Computer Society, 0-7695-2585-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Mark H. Carpenter, C. A. Kennedy, Hester Bijl, S. A. Viken, Veer N. Vatsa |
Fourth-Order Runge-Kutta Schemes for Fluid Mechanics Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 25(1-2), pp. 157-194, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
backward differentiation formulae, modified extended efficiency, convection-diffusion-reaction, turbulence, time discretization, Runge-Kutta, High-order |
28 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek |
Concurrently-secure credential ownership proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 161-172, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
identity-based cryptography, signature schemes, identification schemes, credential systems, designated-verifier signatures |
28 | Di Ma, Gene Tsudik |
Extended Abstract: Forward-Secure Sequential Aggregate Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 86-91, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
key compromise, sensors, forward security, signature schemes, authentication schemes, aggregate signatures |
28 | Benedito J. B. Fonseca Jr. |
An augmented graph-based coloring scheme to derive upper bounds for the performance of distributed schedulers in CSMA-based mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 761-766, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
coloring schemes, graph-based coloring schemes, performance upper bound, mobile ad hoc networks, graph theory, 802.11, scheduling algorithms, CSMA |
28 | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang |
A Group Key Distribution Scheme with Decentralised User Join. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 146-163, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Key distribution schemes, group key distribution schemes, user join, traceability, secure multicast, user revocation |
28 | Bob Janssens, W. Kent Fuchs |
The Performance of Cache-Based Error Recovery in Multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 5(10), pp. 1033-1043, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
cache-based error recovery performance, cache-based checkpointing, rollback error recovery, shared-memorymultiprocessors, inherent redundancy, computation state, rollback propagation, EncoreMultimax, recovery schemes, cache-based schemes, low performance overhead, checkpoint interval, performance evaluation, performance evaluation, virtual machines, multiprocessors, redundancy, memory hierarchy, shared memory systems, system recovery, buffer storage, parallel applications, cache coherence protocol, transient errors, cache replacement policy, address traces |
28 | Enrico De Micheli, Bruno Caprile, P. Ottonello, Vincent Torre |
Localization and Noise in Edge Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 11(10), pp. 1106-1117, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
trihedral vertices, gradient schemes, zero-crossing schemes, localization, edge detection, filters, noise, computerised picture processing, computerised picture processing, computerised pattern recognition, computerised pattern recognition, sensitivity, digital images |
28 | Matthew Hague, Andrzej S. Murawski, C.-H. Luke Ong, Olivier Serre |
Collapsible Pushdown Automata and Recursion Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LICS ![In: Proceedings of the Twenty-Third Annual IEEE Symposium on Logic in Computer Science, LICS 2008, 24-27 June 2008, Pittsburgh, PA, USA, pp. 452-461, 2008, IEEE Computer Society, 978-0-7695-3183-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Higher-order pushdown automata, game semantics, higher-order recursion schemes |
28 | Ronan Cummins, Colm O'Riordan |
Evolving local and global weighting schemes in information retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Retr. ![In: Inf. Retr. 9(3), pp. 311-330, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Information Retrieval, Genetic Programming, Term-Weighting Schemes |
28 | Miodrag J. Mihaljevic |
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 137-154, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
stateless receivers, time varying schemes, heterogeneous structures, tree graphs, reconfigurability, key management, broadcast encryption |
28 | Douglas R. Stinson, Ruizhong Wei |
Key Preassigned Traceability Schemes for Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 144-156, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
key preassigned scheme, traceability, broadcast encryption, secret sharing schemes, combinatorial designs |
28 | Motonori Nakamura, Katsutoshi Sawada |
Scalable coding schemes based on DCT and MC prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings 1995 International Conference on Image Processing, Washington, DC, USA, October 23-26, 1995, pp. 575-578, 1995, IEEE Computer Society, 0-8186-7310-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
motion compensated interframe prediction, DCT prediction, MC prediction, scalable coding schemes, picture resolution, input picture decomposition, bitstream decoding, MC prediction coding, DCT picture domain, prediction difference picture, DCT decomposition, coding performance, computer simulation experiments, nonscalable coding, video coding, video coding, discrete cosine transforms, motion compensation, image resolution, transform coding, prediction theory |
28 | Fadi N. Sibai, N. K. Sharma 0002, Abdullah A. Abonamah |
Comparison of Reconfiguration Schemes for the C2SC MIN Operating in the Broadcast Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 43(9), pp. 1112-1119, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
C2SC MIN, broadcast mode, complementary two-stage cube, multiple-path multistage interconnection networks, destination discriminator, divide and broadcast, decoded routing tag, conservative schemes, cost/performance analysis, reliability, fault tolerant computing, modularity, regularity, synchronisation, reconfigurable architectures, hypercube networks, simulation results, reconfiguration schemes |
27 | Amos Beimel, Yuval Ishai |
On the Power of Nonlinear Secrect-Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: Proceedings of the 16th Annual IEEE Conference on Computational Complexity, Chicago, Illinois, USA, June 18-21, 2001, pp. 188-202, 2001, IEEE Computer Society, 0-7695-1053-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Chung-Min Chen, Christine T. Cheng |
From discrepancy to declustering: Near-optimal multidimensional declustering strategies for range queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 51(1), pp. 46-73, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Declustering schemes, disk allocations, range query, parallel database |
27 | Chung-Min Chen, Christine T. Cheng |
From Discrepancy to Declustering: Near optimal multidimensional declustering strategies for range queries. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-first ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 3-5, Madison, Wisconsin, USA, pp. 29-38, 2002, ACM, 1-58113-507-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
declustering schemes, disk allocations, range query, parallel database |
26 | Jean-Charles Faugère, Ludovic Perret |
Cryptanalysis of 2R- Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 357-372, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Functional Decomposition Problem (FDP), Gröbner bases, Cryptanalysis, F5 algorithm |
26 | Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee 0001, Jong In Lim 0001 |
Digital Signature Schemes with Restriction on Signing Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 324-335, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Albert R. McSpadden, Noé Lopez-Benitez |
Stochastic Petri nets applied to the performance evaluation of static task allocations in heterogeneous computing environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Heterogeneous Computing Workshop ![In: 6th Heterogeneous Computing Workshop, HCW 1997, Geneva, Switzerland, April 1, 1997, pp. 185-194, 1997, IEEE Computer Society, 0-8186-7879-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
static task allocations, heterogeneous computing environments, processor suite, subtask execution times, enabling functions, rate functions, SPN model, processor heterogeneity, task priorities, allocation schemes, optimization schemes, non-series-parallel graphs, performance evaluation, Petri nets, heuristics, stochastic Petri net, communication costs, task graph, exponential distribution, completion time |
26 | Min Tan 0002, Howard Jay Siegel |
A stochastic model of a dedicated heterogeneous computing system for establishing a greedy approach to developing data relocation heuristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Heterogeneous Computing Workshop ![In: 6th Heterogeneous Computing Workshop, HCW 1997, Geneva, Switzerland, April 1, 1997, pp. 122-134, 1997, IEEE Computer Society, 0-8186-7879-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
dedicated heterogeneous computing system, greedy approach, data relocation heuristics, data relocation, multiple independent subtasks, inter-machine data transfers, optimal matching, data relocation schemes, fixed matching, scheduling, distributed processing, stochastic model, optimization problem, application program, search space, communication times, scheduling schemes, optimization criteria |
26 | Katrin Hoeper, Guang Gong |
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, ADHOC-NOW 2006, Ottawa, Canada, August 17-19, 2006, Proceedings, pp. 224-237, 2006, Springer, 3-540-37246-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Identity-Based Schemes, Key Renewal, Neighborhood Monitoring, Mobile Ad Hoc Networks, Revocation |
26 | Christophe Giraud 0001, Erik Woodward Knudsen |
Fault Attacks on Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 478-491, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature |
26 | H. Joachim Schroll |
High Resolution Relaxed Upwind Schemes in Gas Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 17(1-4), pp. 599-607, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
relaxation approximation, upwind and relaxation schemes, high order reconstruction, conservation law |
26 | Jacques Patarin |
Generic Attacks on Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 222-238, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Feistel permutations, generic attacks on encryption schemes, Luby-Rackoff theory, pseudo-random permutations |
26 | Bongki Moon, Mustafa Uysal, Joel H. Saltz |
Index translation schemes for adaptive computations on distributed memory multicomputers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPPS ![In: Proceedings of IPPS '95, The 9th International Parallel Processing Symposium, April 25-28, 1995, Santa Barbara, California, USA, pp. 812-819, 1995, IEEE Computer Society, 0-8186-7074-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
index translation schemes, globally indexed algorithms, CHAOS runtime support library, software-cached translation, distributed translation table technique, statically irregular problems, 3D DSMC code, NASA Langley, Gray T3D, performance evaluation, parallel programming, parallel programming, program compilers, distributed memory systems, program interpreters, distributed memory multicomputers, adaptive computations, Intel Paragon, optimal performance |
26 | Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu |
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 290-301, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
secret sharing, bilinear pairings, Group signature, signcryption, proxy signature, identity-based signature |
26 | Shafi Goldwasser, Erez Waisbard |
Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, pp. 77-100, 2004, Springer, 3-540-21000-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Tao Tang 0003, Jinghua Wang |
Convergence of MUSCL Relaxing Schemes to the Relaxed Schemes for Conservation Laws with Stiff Source Terms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 15(2), pp. 173-195, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
nonlinear conservation laws, convergence, maximum principle, relaxation scheme |
26 | Tatsuaki Okamoto |
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings, pp. 31-53, 1992, Springer, 3-540-57340-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 37120 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|