|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 20 occurrences of 18 keywords
|
|
|
Results
Found 48 publication records. Showing 48 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
42 | Jinhua Du, Andy Way |
A Three-Pass System Combination Framework by Combining Multiple Hypothesis Alignment Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IALP ![In: 2009 International Conference on Asian Language Processing, IALP 2009, Singapore, December 7-9, 2009, pp. 172-176, 2009, IEEE Computer Society, 978-0-7695-3904-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
three-pass, system combination, hypothesis alignment, super network |
37 | Sam F. Mendicino, Robert A. Hughes, Jeanne T. Martin, Frank H. McMahon, John E. Ranelletti, Richard G. Zwakenberg |
The LRLTRAN compiler. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 11(11), pp. 747-755, 1968. The full citation details ...](Pics/full.jpeg) |
1968 |
DBLP DOI BibTeX RDF |
Polish processor, common subsegments, machine independence, scatter storage technique, optimization, compiler, compiler-compiler, tree representations |
37 | Charles B. Owen, Fillia Makedon |
Bottleneck-Free Separable Affine Image Warping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings 1997 International Conference on Image Processing, ICIP '97, Santa Barbara, California, USA, October 26-29, 1997, pp. 683-686, 1997, IEEE Computer Society, 0-8186-8183-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
37 | Thierry Blu, Michael Unser |
Quantitative L2 Error Analysis for Interpolation Methods and Wavelt Expansions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings 1997 International Conference on Image Processing, ICIP '97, Santa Barbara, California, USA, October 26-29, 1997, pp. 663-666, 1997, IEEE Computer Society, 0-8186-8183-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
28 | Boyeon Song, Kwangjo Kim |
Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings, pp. 237-249, 2000, Springer, 3-540-41452-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Ning-ning Qu, Guang Zhu, Xi-an Zhao, Chang-feng Jing, Jing-guo Lv |
The analysis of surface deformation based on two-pass and three-pass D-InSAR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGARSS ![In: IEEE International Geoscience & Remote Sensing Symposium, IGARSS 2010, July 25-30, 2010, Honolulu, Hawaii, USA, Proceedings, pp. 4561-4563, 2010, IEEE, 978-1-4244-9566-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Joon-Sung Yang, Nur A. Touba |
Expanding Trace Buffer Observation Window for In-System Silicon Debug through Selective Capture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 26th IEEE VLSI Test Symposium (VTS 2008), April 27 - May 1, 2008, San Diego, California, USA, pp. 345-351, 2008, IEEE Computer Society, 978-0-7695-3123-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Trace Buffer Observation Window, Two-Dimensional (2-D) Compaction, Cycling Register, Silicon Debug, MISR |
22 | Paul S. Heckbert |
Adaptive radiosity textures for bidirectional ray tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGGRAPH ![In: Proceedings of the 17th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 1990, Dallas, TX, USA, August 6-10, 1990, pp. 145-154, 1990, ACM, 0-201-50933-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
21 | Daniela Siano |
Three-dimensional/one-dimensional numerical correlation study of a three-pass perforated tube. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Simul. Model. Pract. Theory ![In: Simul. Model. Pract. Theory 19(4), pp. 1143-1153, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Jen-Shiun Chiang, Ting-Hao Hwang, Tsung-Ta Lin, Chih-Hsien Hsia |
High efficiency architecture of escot with pass concurrent context modeling scheme for scalable video coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, USA, pp. 2801-2804, 2008, IEEE, 978-1-4244-1683-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | C. William Gear |
High speed compilation of efficient object code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 8(8), pp. 483-488, 1965. The full citation details ...](Pics/full.jpeg) |
1965 |
DBLP DOI BibTeX RDF |
|
16 | François Dupont |
A new Shamir's three pass random matrix ciphering mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 237-248, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Emil Faure, Anatoly Shcherba, Artem Lavdanskyi, Mykola Makhynko, Muhabbat Khizirova |
Three-Pass Protocol on Permutations: Implementation Example and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPITS ![In: Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), Kyiv, Ukraine, February 28, 2024 (online)., pp. 110-124, 2024, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
16 | Bagus Santoso, Yasuhiko Ikematsu, Shuhei Nakamura, Takanori Yasuda |
Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.03255, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Bagus Santoso, Taiyo Yamaguchi |
A New Three-Pass Code-based Zero-Knowledge Identification Scheme with Cheating Probability of Exactly Half. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISITA ![In: International Symposium on Information Theory and Its Applications, ISITA 2018, Singapore, October 28-31, 2018, pp. 394-398, 2018, IEEE, 978-4-88552-318-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
16 | Mohammed Issam Younis, Mustafa Hashim Abdulkareem |
ITPMAP: An Improved Three-Pass Mutual Authentication Protocol for Secure RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 96(1), pp. 65-101, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Cansu Betin Onur, Adnan Kiliç, Ertan Onur |
Impossibility of Three Pass Protocol using Public Abelian Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1703.06179, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
16 | Amin Subandi, Rini Meiyanti, Cut Lika Mestika Sandy, Rahmat Widia Sembiring |
Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1707.01609, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
16 | S. Nithya, K. Meena alias Jeyanthi |
Genetic algorithm based bacterial foraging optimization with three-pass protocol concept for heterogeneous network security enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. ![In: J. Comput. Sci. 21, pp. 275-282, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Hajer Boujezza, Hella Kaffel-Ben Ayed, Leïla Azouz Saïdane |
Protection of IoT transaction using ID-KEM based on three-pass protocol countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, Valencia, Spain, June 26-30, 2017, pp. 423-428, 2017, IEEE, 978-1-5090-4372-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Sourav Mandal 0003, Somnath Pal |
A Three-Pass Algorithm for Generation of BE-Matrices from IUPAC Names. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Chemoinformatics Chem. Eng. ![In: Int. J. Chemoinformatics Chem. Eng. 3(2), pp. 45-63, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
16 | Anselme Tueno |
Zwei Anwendungen des Paillier-Kryptosystems: Blinde Signatur und Three-Pass-Protocol ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1206.1078, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
16 | Jarred Barber, Stephen Kogon |
Probabilistic three-pass SAR Coherent Change Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSCC ![In: Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers, ACSCC 2012, Pacific Grove, CA, USA, November 4-7, 2012, pp. 1723-1726, 2012, IEEE, 978-1-4673-5050-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
16 | Yoshito Kanamori, Seong-Moo Yoo |
Quantum Three-Pass protocol: Key distribution using quantum superposition states ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1004.0599, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
16 | Jinhua Du, Andy Way |
An Incremental Three-pass System Combination Framework by Combining Multiple Hypothesis Alignment Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Asian Lang. Process. ![In: Int. J. Asian Lang. Process. 20(1), pp. 1-16, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
16 | Jinhua Du, Pavel Pecina, Andy Way |
An Augmented Three-Pass System Combination Framework: DCU Combination System for WMT 2010. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMT@ACL ![In: Proceedings of the Joint Fifth Workshop on Statistical Machine Translation and MetricsMATR, WMT@ACL 2010, Uppsala, Sweden, July 15-16, 2010, pp. 290-295, 2010, Association for Computational Linguistics, 978-1-932432-71-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
16 | Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu |
Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings, pp. 49-68, 2010, Springer, 978-3-642-17400-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
16 | Meng-Hui Lim, Chee-Min Yeoh, Sanggon Lee, Hyotaek Lim, Hoonjae Lee 0001 |
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , 7th International IFIP-TC6 Networking Conference, Singapore, May 5-9, 2008, Proceedings, pp. 170-182, 2008, Springer, 978-3-540-79548-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Andre Gustavo Degraf Uchoa, Marcelo Eduardo Pellenz, Altair Olivo Santin, Carlos Alberto Maziero |
A Three-Pass Protocol for Cryptography Based on Padding for Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 4th IEEE Consumer Communications and Networking Conference, CCNC 2007, Las Vegas, NV, USA, January 11-13, 2007, pp. 287-291, 2007, IEEE, 1-4244-0667-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Sung-Min Lee 0006, Tai-Yun Kim |
Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 18th International Conference, SAFECOMP'99, Toulouse, France, September, 1999, Proceedings, pp. 459-467, 1999, Springer, 3-540-66488-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Pat Hanrahan |
Three-pass affine transforms for volume rendering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VVS ![In: Proceedings of the 1990 Workshop on Volume Visualization, VVS 1990, San Diego, California, USA, December 10-11, 1990, pp. 71-78, 1990, ACM, 978-0-89791-417-8. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
16 | Marc Girault |
A (non-practical) three-pass identification protocol using coding theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AUSCRYPT ![In: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings, pp. 265-272, 1990, Springer, 3-540-53000-2. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
11 | Wai-Shun Tong, Chi-Keung Tang |
Robust Estimation of Adaptive Tensors of Curvature by Tensor Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 27(3), pp. 434-449, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Ulf Assarsson, Tomas Akenine-Möller |
Occlusion culling and z-fail for soft shadow volume algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vis. Comput. ![In: Vis. Comput. 20(8-9), pp. 601-612, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Graphics hardware, Soft shadows, Shadow volumes |
9 | Yijun Li, Magdy A. Bayoumi |
A Three-Level Parallel High-Speed Low-Power Architecture for EBCOT of JPEG 2000. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 16(9), pp. 1153-1163, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
6 | Dan J. Kadrmas |
Rotate-and-Slant Projector for Fast LOR-Based Fully-3-D Iterative PET Reconstruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Medical Imaging ![In: IEEE Trans. Medical Imaging 27(8), pp. 1071-1083, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Vladimir Shpilrain, Alexander Ushakov |
An Authentication Scheme Based on the Twisted Conjugacy Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 366-372, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Karl Meier, Alessandro Forin |
Hardware Compilation from Machine Code with M2V. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 16th IEEE International Symposium on Field-Programmable Custom Computing Machines, FCCM 2008, 14-15 April 2008, Stanford, Palo Alto, California, USA, pp. 293-295, 2008, IEEE Computer Society, 978-0-7695-3307-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Srinivasan Keshav |
How to read a paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 37(3), pp. 83-84, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
reading, paper, hints |
6 | Yoshito Kanamori, Seong-Moo Yoo, Mohammad Al-Shurman |
A quantum no-key protocol for secure data communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (2) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2, pp. 92-93, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
6 | Gwo-Ching Chang |
A Feasible Security Mechanism for Low Cost RFID Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMB ![In: 2005 International Conference on Mobile Business (ICMB 2005), 11-13 July 2005, Sydney, Australia, pp. 675-677, 2005, IEEE Computer Society, 0-7695-2367-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
6 | Taekyoung Kwon 0002 |
Practical Authenticated Key Agreement Using Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 1-12, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
6 | Paul Smith, Tom Drummond, Kimon Roussopoulos |
Computing MAP trajectories by representing, propagating and combining PDFs over groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCV ![In: 9th IEEE International Conference on Computer Vision (ICCV 2003), 14-17 October 2003, Nice, France, pp. 1275-1282, 2003, IEEE Computer Society, 0-7695-1950-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
6 | Nathan A. Carr, Jesse D. Hall, John C. Hart |
GPU algorithms for radiosity and subsurface scattering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Graphics Hardware ![In: Proceedings of the 2003 ACM SIGGRAPH/EUROGRAPHICS Workshop on Graphics Hardware, San Diego, California, USA, July 26-27, 2003, pp. 51-59, 2003, Eurographics Association, 1-58113-739-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
6 | Michael Unser, Philippe Thévenaz, Leonid P. Yaroslavsky |
Convolution-based interpolation for fast, high-quality rotation of images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 4(10), pp. 1371-1381, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
6 | Uwe F. Pleban, Peter Lee 0001 |
An Automatically Generated, Realistic Compiler for an Imperative Programming Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the ACM SIGPLAN'88 Conference on Programming Language Design and Implementation (PLDI), Atlanta, Georgia, USA, June 22-24, 1988, pp. 222-232, 1988, ACM, 0-89791-269-1. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
C |
6 | Yvo Desmedt, Andrew M. Odlyzko |
A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings, pp. 516-522, 1985, Springer, 3-540-16463-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
6 | Vincent A. Busam, Donald E. Englund |
Optimization of expressions in Fortran. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 12(12), pp. 666-674, 1969. The full citation details ...](Pics/full.jpeg) |
1969 |
DBLP DOI BibTeX RDF |
DO loops, invariant calculations, optimization, compilation, compilers, FORTRAN, FORTRAN, register allocation, expressions, common subexpressions, subscripts |
Displaying result #1 - #48 of 48 (100 per page; Change: )
|
|