|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 20184 occurrences of 7126 keywords
|
|
|
Results
Found 37120 publication records. Showing 37120 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
55 | Markus Michels, Markus Stadler |
Generic Constructions for Secure and Efficient Confirmer Signature Schemes. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
Designated confirmer signature schemes, undeniable signature schemes, provable security, commitment schemes |
48 | Amos Korman |
General compact labeling schemes for dynamic trees. |
Distributed Comput. |
2007 |
DBLP DOI BibTeX RDF |
Distributed algorithms, Dynamic networks, Labeling schemes, Routing schemes |
48 | Rémi Abgrall, Philip L. Roe |
High Order Fluctuation Schemes on Triangular Meshes. |
J. Sci. Comput. |
2003 |
DBLP DOI BibTeX RDF |
upwind stabilized schemes, hyperbolic problems, residual distributive schemes, finite elements, high order schemes |
46 | Sergio Cabello, Carles Padró, Germán Sáez |
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure. |
FCT |
1999 |
DBLP DOI BibTeX RDF |
Detection of cheaters, Robust and secure schemes, Cryptography, Secret sharing schemes |
44 | Pierre Fraigniaud, Amos Korman |
On randomized representations of graphs using short labels. |
SPAA |
2009 |
DBLP DOI BibTeX RDF |
adjacency labeling schemes, ancestry labeling schemes, probabilistic embeddings, universal graphs, distributed algorithms |
42 | Tatsuro Ito, Kenichiro Tanabe, Paul M. Terwilliger |
Some algebra related to P- and Q-polynomial association schemes. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
42 | Paul Camion |
Codes over Zpn and association schemes. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
42 | Wai Yin Mok |
A Comparative Study of Various Nested Normal Forms. |
IEEE Trans. Knowl. Data Eng. |
2002 |
DBLP DOI BibTeX RDF |
nested relation schemes, nested database schemes, nested databases, nested normal forms, conflict-free sets of MVDs, acyclic database schemes, nested database design, design flexibility, algorithms, object-relational databases, nested relations, data redundancy, object-relational database management systems, SQL:1999 |
41 | Vanesa Daza, Javier Herranz, Germán Sáez |
Protocols useful on the Internet from distributed signature schemes. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Distributed signatures, Metering schemes, Distributed key distribution schemes |
40 | P. H. Muir |
Optimal discrete and continuous mono-implicit Runge-Kutta schemes for BVODEs. |
Adv. Comput. Math. |
1999 |
DBLP DOI BibTeX RDF |
Runge-Kutta schemes, boundary value ODEs, efficiency, 65L05, 65L10 |
39 | James H. Anderson, Rohit Jain, Srikanth Ramamurthy |
Wait-free object-sharing schemes for real-time uniprocessors and multiprocessors. |
RTSS |
1997 |
DBLP DOI BibTeX RDF |
wait-free object-sharing schemes, real-time uniprocessors, real-time multiprocessors, priority inheritance protocol, breakdown utilization experiments, lock-based schemes, multiprocessing systems, nonblocking, user level, priority ceiling protocol |
37 | Seiko Arita, Koji Tsurudome |
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption |
37 | Amos Korman, David Peleg |
Compact separator decompositions in dynamic trees and applications to labeling schemes. |
Distributed Comput. |
2008 |
DBLP DOI BibTeX RDF |
Informative labeling schemes, Distributed algorithms, Dynamic networks, Graph decompositions, Routing schemes |
37 | Rémi Abgrall, F. Marpeau |
Residual Distribution Schemes on Quadrilateral Meshes. |
J. Sci. Comput. |
2007 |
DBLP DOI BibTeX RDF |
residual distribution schemes, structured and hybrid meshes, non oscillatory schemes, Conservation laws |
37 | Amos Korman, David Peleg |
Compact Separator Decompositions in Dynamic Trees and Applications to Labeling Schemes. |
DISC |
2007 |
DBLP DOI BibTeX RDF |
informative labeling schemes, Distributed algorithms, dynamic networks, graph decompositions, routing schemes |
37 | Gabriella Puppo, Giovanni Russo 0001 |
Staggered Finite Difference Schemes for Conservation Laws. |
J. Sci. Comput. |
2006 |
DBLP DOI BibTeX RDF |
balance laws, central schemes, Conservation laws, high-order accuracy, finite difference schemes |
37 | Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe |
Mutually Trusted Authority-Free Secret Sharing Schemes. |
J. Cryptol. |
1997 |
DBLP DOI BibTeX RDF |
Key words, Secret sharing schemes, Secret sharing schemes |
36 | Alexander Barg, Simon Litsyn (eds.) |
Codes and Association Schemes, Proceedings of a DIMACS Workshop, Piscataway, New Jersey, USA, November 9-12, 1999 |
Codes and Association Schemes |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Ilia Krasikov, Simon Litsyn |
Survey of binary Krawtchouk polynomials. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | |
Preface. |
Codes and Association Schemes |
1999 |
DBLP BibTeX RDF |
|
36 | Peter G. Boyvalenkov, Danyo Danev, Peter Kazakov |
Indexes of spherical codes. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Laurent Habsieger |
Integral zeroes of Krawtchouk polynomials. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Philippe Gaborit, W. Cary Huffman, Jon-Lark Kim, Vera Pless |
On additive GF(4) codes. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | William J. Martin |
Design systems: Combinatorial characterizations of Delsarte $\mathcal T$-designs via partially ordered sets. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Alexander Barg, David B. Jaffe |
Numerical results on the asymptotic rate of binary codes. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Christine Bachoc |
Harmonic weight enumerators of nonbinary codes and MacWilliams identities. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Claude Carlet, Philippe Guillot |
Bent, resilient functions and the numerical normal form. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Tuvi Etzion |
On perfect codes in the Johnson scheme. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Tero Laihonen |
On an algebraic method for bounding the covering radius. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | |
Foreword. |
Codes and Association Schemes |
1999 |
DBLP BibTeX RDF |
|
36 | Tuvi Etzion, Jack H. van Lint |
On perfect constant weight codes. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Ulrich Tamm |
Communication complexity and orthogonal polynomials. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Jürgen Bierbrauer, Holger Schellwat |
Weakly biased arrays, almost independent arrays and error-correcting codes. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Italo J. Dejter, Kevin T. Phelps |
Ternary Hamming and binary perfect covering codes. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Gérard D. Cohen, Iiro S. Honkala, Antoine Lobstein, Gilles Zémor |
On identifying codes. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Ilia Krasikov |
Bounds for the Christoffel-Darboux kernel of the binary Krawtchouk polynomials. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Irfan Siap, Nuh Aydin, Dijen K. Ray-Chaudhuri |
New 1-generator quasi-twisted codes over GF(5). |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Iwan M. Duursma |
A Riemann hypothesis analogue for self-dual codes. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Alexei E. Ashikhmin, Alexander Barg, Simon Litsyn |
Estimates of the distance distribution of nonbinary codes, with applications. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Mikhail E. Muzychuk, Mikhail H. Klin, Reinhard Pöschel |
The isomorphism problem for circulant graphs via Schur ring theory. |
Codes and Association Schemes |
1999 |
DBLP DOI BibTeX RDF |
|
35 | Chun-Yuan Lin, Yeh-Ching Chung |
Data distribution schemes of sparse arrays on distributed memory multicomputers. |
J. Supercomput. |
2007 |
DBLP DOI BibTeX RDF |
Data distribution schemes, Data compression methods, Sparse ratio, Distributed memory multicomputers, Partition methods |
35 | Guomin Yang, Jing Chen 0001, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang 0002 |
A More Natural Way to Construct Identity-Based Identification Schemes. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
Concurrent attacks, Identity-based cryptography, Identification schemes |
35 | Ronan Cummins, Colm O'Riordan |
Evolving General Term-Weighting Schemes for Information Retrieval: Tests on Larger Collections. |
Artif. Intell. Rev. |
2005 |
DBLP DOI BibTeX RDF |
information retrieval, genetic programming, term-weighting schemes |
35 | Mark D. Gross, Ellen Yi-Luen Do |
Diagram query and image retrieval in design. |
ICIP |
1995 |
DBLP DOI BibTeX RDF |
architectural CAD, diagram query, architectural education, visual references, key word retrieval schemes, texture retrieval schemes, color retrieval schemes, shape based retrieval, free hand drawing, Drawing Analogies, diagram keys, architecture, digital libraries, query processing, image retrieval, image recognition, educational technology, visual databases, image indexing, architectural designers, conceptual design, creative design, visual images |
35 | Sandra Pieraccini, Gabriella Puppo |
Implicit-Explicit Schemes for BGK Kinetic Equations. |
J. Sci. Comput. |
2007 |
DBLP DOI BibTeX RDF |
BGK model, kinetic equations, implicit-explicit schemes, high-order schemes |
33 | Hao Chen 0095 |
Efficient compromising resilient authentication schemes for large scale wireless sensor networks. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
code and function based authentication schemes, polynomial based authentication scheme, wireless sensor netowork |
33 | Chun-Yuan Lin, Yeh-Ching Chung, Jen-Shiuh Liu |
Efficient Data Distribution Schemes for EKMR-Based Sparse Arrays on Distributed Memory Multicomputers. |
J. Supercomput. |
2005 |
DBLP DOI BibTeX RDF |
data distribution schemes, data compression methods, sparse ratio, partition methods, Karnaugh map |
33 | Pim Tuyls, Henk D. L. Hollmann, Jack H. van Lint, Ludo M. G. M. Tolhuizen |
XOR-based Visual Cryptography Schemes. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
Threshold visual secret sharing schemes, XOR, MDS codes |
33 | Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish |
Versatile padding schemes for joint signature and encryption. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption |
32 | Rosa Donat, Pep Mulet |
Characteristic-Based Schemes for Multi-Class Lighthill-Whitham-Richards Traffic Models. |
J. Sci. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Multi-class Lighthill Whitham Richards traffic model, High resolution shock capturing schemes, Finite-difference WENO schemes, Adaptive mesh refinement |
32 | Akinori Kawachi, Keisuke Tanaka, Keita Xagawa |
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
concurrent security, ad hoc anonymous identification schemes, identification schemes, Lattice-based cryptography |
32 | Amos Korman, Shay Kutten |
Labeling Schemes with Queries. |
SIROCCO |
2007 |
DBLP DOI BibTeX RDF |
distance queries, Labeling schemes, routing schemes |
32 | Tapan K. Sengupta, S. K. Sircar, Anurag Dipankar |
High Accuracy Schemes for DNS and Acoustics. |
J. Sci. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Computational acoustics, compact difference schemes, dispersion relation preservation schemes, DNS, time discretization |
32 | Jaume Martí-Farré, Carles Padró |
Secret Sharing Schemes on Access Structures with Intersection Number Equal to One. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
ideal schemes, Cryptography, secret sharing schemes, information rate |
32 | Jovan Dj. Golic |
On Matroid Characterization of Ideal Secret Sharing Schemes. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Matroids, Matroids, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Access structures, Access structures |
31 | Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt |
Efficient Constructions of Signcryption Schemes and Signcryption Composability. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
multi-user security, signcryption, generic construction |
31 | Birgit Pfitzmann |
Sorting Out Signature Schemes. |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
31 | David T. Harper III |
Block, Multistride Vector, and FFT Accesses in Parallel Memory Systems. |
IEEE Trans. Parallel Distributed Syst. |
1991 |
DBLP DOI BibTeX RDF |
dynamic storage schemes, parallel memory performance, vectoraccesses, block accesses, constant-geometry FFT accesses, linear addresstransformations, XOR schemes, analytical results, bufferingeffects, pipelined memory systems, memory bank cycle time, fastFourier transforms, fast Fourier transform, memory architecture, quantitative analysis, conflict-free access |
31 | Oriol Farràs, Jaume Martí-Farré, Carles Padró |
Ideal Multipartite Secret Sharing Schemes. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Ideal access structures, Multipartite secret sharing, Multipartite matroids, Discrete polymatroids, Secret sharing, Ideal secret sharing schemes |
31 | Stelvio Cimato, Roberto De Prisco, Alfredo De Santis |
Optimal Colored Threshold Visual Cryptography Schemes. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
visual crytography, secret sharing schemes |
31 | Jean-Paul Chehab, Bruno Costa 0002 |
Time Explicit Schemes and Spatial Finite Differences Splittings. |
J. Sci. Comput. |
2004 |
DBLP DOI BibTeX RDF |
incremental unknowns, multilevel schemes, Burgers equation, stability, finite differences |
31 | Maarten van Veen, Fred Mulder, Karel Lemmen |
What is lacking in curriculum schemes for computing/informatics? |
ITiCSE |
2004 |
DBLP DOI BibTeX RDF |
curriculum implementation, curriculum research and development, curriculum schemes, curriculum theory, computing, informatics |
31 | Karthikeyan Duraisamy, James D. Baeder, Jian-Guo Liu 0006 |
Concepts and Application of Time-Limiters to High Resolution Schemes. |
J. Sci. Comput. |
2003 |
DBLP DOI BibTeX RDF |
high resolution schemes, non-linear time integration, time-limiting |
31 | Brian King |
Requirements for Group Independent Linear Threshold Secret Sharing Schemes. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
linear secret sharing, group independent linear threshold schemes, monotone span programs and bounds on share size, secret sharing, threshold cryptography |
31 | Chun-Yuan Lin, Yeh-Ching Chung, Jen-Shiuh Liu |
Data Distribution Schemes of Sparse Arrays on Distributed Memory Multicomputers. |
ICPP Workshops |
2002 |
DBLP DOI BibTeX RDF |
Data distribution schemes, Data compression methods, Sparse ratio, distributed memory multicomputers, Partition methods |
31 | Michel Abdalla, Sara K. Miner, Chanathip Namprempre |
Forward-Secure Threshold Signature Schemes. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
proactive cryptography, forward security, threshold cryptography, signature schemes |
31 | Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson |
Dynamic Multi-threshold Metering Schemes. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
Metering Schemes, Security, Cryptography, Entropy |
30 | Sergio Amat, Sonia Busquier, Juan Carlos Trillo |
On multiresolution schemes using a stencil selection procedure: applications to ENO schemes. |
Numer. Algorithms |
2007 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) 41A05, 65D05, 65D17, 41A10 |
30 | Jaume Martí-Farré, Carles Padró |
Secret Sharing Schemes with Three or Four Minimal Qualified Subsets. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
ideal schemes, cryptography, secret sharing schemes, information rate |
29 | Chenggui Zhao, Wenjun Xiao, Yong Qin |
Hybrid Diffusion Schemes for Load Balancing on OTIS-Networks. |
ICA3PP |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Sundeep Narravula, Hyun-Wook Jin, Karthikeyan Vaidyanathan, Dhabaleswar K. Panda 0001 |
Designing Efficient Cooperative Caching Schemes for Multi-Tier Data-Centers over RDMA-enabled Networks. |
CCGRID |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Mark H. Carpenter, C. A. Kennedy, Hester Bijl, S. A. Viken, Veer N. Vatsa |
Fourth-Order Runge-Kutta Schemes for Fluid Mechanics Applications. |
J. Sci. Comput. |
2005 |
DBLP DOI BibTeX RDF |
backward differentiation formulae, modified extended efficiency, convection-diffusion-reaction, turbulence, time discretization, Runge-Kutta, High-order |
28 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek |
Concurrently-secure credential ownership proofs. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
identity-based cryptography, signature schemes, identification schemes, credential systems, designated-verifier signatures |
28 | Di Ma, Gene Tsudik |
Extended Abstract: Forward-Secure Sequential Aggregate Authentication. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
key compromise, sensors, forward security, signature schemes, authentication schemes, aggregate signatures |
28 | Benedito J. B. Fonseca Jr. |
An augmented graph-based coloring scheme to derive upper bounds for the performance of distributed schedulers in CSMA-based mobile ad hoc networks. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
coloring schemes, graph-based coloring schemes, performance upper bound, mobile ad hoc networks, graph theory, 802.11, scheduling algorithms, CSMA |
28 | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang |
A Group Key Distribution Scheme with Decentralised User Join. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
Key distribution schemes, group key distribution schemes, user join, traceability, secure multicast, user revocation |
28 | Bob Janssens, W. Kent Fuchs |
The Performance of Cache-Based Error Recovery in Multiprocessors. |
IEEE Trans. Parallel Distributed Syst. |
1994 |
DBLP DOI BibTeX RDF |
cache-based error recovery performance, cache-based checkpointing, rollback error recovery, shared-memorymultiprocessors, inherent redundancy, computation state, rollback propagation, EncoreMultimax, recovery schemes, cache-based schemes, low performance overhead, checkpoint interval, performance evaluation, performance evaluation, virtual machines, multiprocessors, redundancy, memory hierarchy, shared memory systems, system recovery, buffer storage, parallel applications, cache coherence protocol, transient errors, cache replacement policy, address traces |
28 | Enrico De Micheli, Bruno Caprile, P. Ottonello, Vincent Torre |
Localization and Noise in Edge Detection. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1989 |
DBLP DOI BibTeX RDF |
trihedral vertices, gradient schemes, zero-crossing schemes, localization, edge detection, filters, noise, computerised picture processing, computerised picture processing, computerised pattern recognition, computerised pattern recognition, sensitivity, digital images |
28 | Matthew Hague, Andrzej S. Murawski, C.-H. Luke Ong, Olivier Serre |
Collapsible Pushdown Automata and Recursion Schemes. |
LICS |
2008 |
DBLP DOI BibTeX RDF |
Higher-order pushdown automata, game semantics, higher-order recursion schemes |
28 | Ronan Cummins, Colm O'Riordan |
Evolving local and global weighting schemes in information retrieval. |
Inf. Retr. |
2006 |
DBLP DOI BibTeX RDF |
Information Retrieval, Genetic Programming, Term-Weighting Schemes |
28 | Miodrag J. Mihaljevic |
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
stateless receivers, time varying schemes, heterogeneous structures, tree graphs, reconfigurability, key management, broadcast encryption |
28 | Douglas R. Stinson, Ruizhong Wei |
Key Preassigned Traceability Schemes for Broadcast Encryption. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
key preassigned scheme, traceability, broadcast encryption, secret sharing schemes, combinatorial designs |
28 | Motonori Nakamura, Katsutoshi Sawada |
Scalable coding schemes based on DCT and MC prediction. |
ICIP |
1995 |
DBLP DOI BibTeX RDF |
motion compensated interframe prediction, DCT prediction, MC prediction, scalable coding schemes, picture resolution, input picture decomposition, bitstream decoding, MC prediction coding, DCT picture domain, prediction difference picture, DCT decomposition, coding performance, computer simulation experiments, nonscalable coding, video coding, video coding, discrete cosine transforms, motion compensation, image resolution, transform coding, prediction theory |
28 | Fadi N. Sibai, N. K. Sharma 0002, Abdullah A. Abonamah |
Comparison of Reconfiguration Schemes for the C2SC MIN Operating in the Broadcast Mode. |
IEEE Trans. Computers |
1994 |
DBLP DOI BibTeX RDF |
C2SC MIN, broadcast mode, complementary two-stage cube, multiple-path multistage interconnection networks, destination discriminator, divide and broadcast, decoded routing tag, conservative schemes, cost/performance analysis, reliability, fault tolerant computing, modularity, regularity, synchronisation, reconfigurable architectures, hypercube networks, simulation results, reconfiguration schemes |
27 | Amos Beimel, Yuval Ishai |
On the Power of Nonlinear Secrect-Sharing. |
CCC |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Chung-Min Chen, Christine T. Cheng |
From discrepancy to declustering: Near-optimal multidimensional declustering strategies for range queries. |
J. ACM |
2004 |
DBLP DOI BibTeX RDF |
Declustering schemes, disk allocations, range query, parallel database |
27 | Chung-Min Chen, Christine T. Cheng |
From Discrepancy to Declustering: Near optimal multidimensional declustering strategies for range queries. (PDF / PS) |
PODS |
2002 |
DBLP DOI BibTeX RDF |
declustering schemes, disk allocations, range query, parallel database |
26 | Jean-Charles Faugère, Ludovic Perret |
Cryptanalysis of 2R- Schemes. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
Functional Decomposition Problem (FDP), Gröbner bases, Cryptanalysis, F5 algorithm |
26 | Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee 0001, Jong In Lim 0001 |
Digital Signature Schemes with Restriction on Signing Capability. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Albert R. McSpadden, Noé Lopez-Benitez |
Stochastic Petri nets applied to the performance evaluation of static task allocations in heterogeneous computing environments. |
Heterogeneous Computing Workshop |
1997 |
DBLP DOI BibTeX RDF |
static task allocations, heterogeneous computing environments, processor suite, subtask execution times, enabling functions, rate functions, SPN model, processor heterogeneity, task priorities, allocation schemes, optimization schemes, non-series-parallel graphs, performance evaluation, Petri nets, heuristics, stochastic Petri net, communication costs, task graph, exponential distribution, completion time |
26 | Min Tan 0002, Howard Jay Siegel |
A stochastic model of a dedicated heterogeneous computing system for establishing a greedy approach to developing data relocation heuristics. |
Heterogeneous Computing Workshop |
1997 |
DBLP DOI BibTeX RDF |
dedicated heterogeneous computing system, greedy approach, data relocation heuristics, data relocation, multiple independent subtasks, inter-machine data transfers, optimal matching, data relocation schemes, fixed matching, scheduling, distributed processing, stochastic model, optimization problem, application program, search space, communication times, scheduling schemes, optimization criteria |
26 | Katrin Hoeper, Guang Gong |
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. |
ADHOC-NOW |
2006 |
DBLP DOI BibTeX RDF |
Identity-Based Schemes, Key Renewal, Neighborhood Monitoring, Mobile Ad Hoc Networks, Revocation |
26 | Christophe Giraud 0001, Erik Woodward Knudsen |
Fault Attacks on Signature Schemes. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature |
26 | H. Joachim Schroll |
High Resolution Relaxed Upwind Schemes in Gas Dynamics. |
J. Sci. Comput. |
2002 |
DBLP DOI BibTeX RDF |
relaxation approximation, upwind and relaxation schemes, high order reconstruction, conservation law |
26 | Jacques Patarin |
Generic Attacks on Feistel Schemes. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Feistel permutations, generic attacks on encryption schemes, Luby-Rackoff theory, pseudo-random permutations |
26 | Bongki Moon, Mustafa Uysal, Joel H. Saltz |
Index translation schemes for adaptive computations on distributed memory multicomputers. |
IPPS |
1995 |
DBLP DOI BibTeX RDF |
index translation schemes, globally indexed algorithms, CHAOS runtime support library, software-cached translation, distributed translation table technique, statically irregular problems, 3D DSMC code, NASA Langley, Gray T3D, performance evaluation, parallel programming, parallel programming, program compilers, distributed memory systems, program interpreters, distributed memory multicomputers, adaptive computations, Intel Paragon, optimal performance |
26 | Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu |
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
secret sharing, bilinear pairings, Group signature, signcryption, proxy signature, identity-based signature |
26 | Shafi Goldwasser, Erez Waisbard |
Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Tao Tang 0003, Jinghua Wang |
Convergence of MUSCL Relaxing Schemes to the Relaxed Schemes for Conservation Laws with Stiff Source Terms. |
J. Sci. Comput. |
2000 |
DBLP DOI BibTeX RDF |
nonlinear conservation laws, convergence, maximum principle, relaxation scheme |
26 | Tatsuaki Okamoto |
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 37120 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|