The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for schemes with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1945-1966 (15) 1967-1969 (16) 1970-1971 (19) 1972 (15) 1973-1974 (31) 1975-1976 (31) 1977 (26) 1978 (27) 1979 (35) 1980 (34) 1981 (34) 1982 (51) 1983 (57) 1984 (77) 1985 (58) 1986 (66) 1987 (91) 1988 (105) 1989 (131) 1990 (151) 1991 (138) 1992 (171) 1993 (203) 1994 (267) 1995 (320) 1996 (347) 1997 (454) 1998 (442) 1999 (635) 2000 (753) 2001 (944) 2002 (1139) 2003 (1396) 2004 (1967) 2005 (2567) 2006 (2950) 2007 (2977) 2008 (3115) 2009 (1912) 2010 (917) 2011 (797) 2012 (853) 2013 (925) 2014 (893) 2015 (857) 2016 (904) 2017 (938) 2018 (912) 2019 (1048) 2020 (1091) 2021 (1018) 2022 (1029) 2023 (945) 2024 (226)
Publication types (Num. hits)
article(16312) book(27) data(1) incollection(159) inproceedings(20275) phdthesis(345) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 20184 occurrences of 7126 keywords

Results
Found 37120 publication records. Showing 37120 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
25Ruibin Xu, Rami G. Melhem, Daniel Mossé A unified practical approach to stochastic DVS scheduling. Search on Bibsonomy EMSOFT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stochastic DVS scheme, real-time, power management, dynamic voltage scaling, fully polynomial time approximation scheme
24Willy Susilo, Yi Mu 0001 Non-interactive Deniable Ring Authentication. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ring signature schemes, non-interactive, ring-to-ring authentication, deniable
24Mayez A. Al-Mouhamed, Steven S. Seiden A Heuristic Storage for Minimizing Access Time of Arbitrary Data Patterns. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Boolean matrices, performance evaluation, heuristics, NP-complete, memory organization, storage schemes, parallel memories
24Steven L. Scott, Gurindar S. Sohi The Use of Feedback in Multiprocessors and Its Application to Tree Saturation Control. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF tree saturation control, feedback control schemes, hot-spot accesses, feedback, feedback, multiprocessor interconnection networks, multiprocessing systems, multiprocessor systems, multistage interconnection networks
24Ji Young Chun, Yong Ho Kim, Jung Yeon Hwang, Dong Hoon Lee 0001 Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Naoki Kobayashi 0001 Types and Recursion Schemes for Higher-Order Program Verification. Search on Bibsonomy APLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Taeho Jo 0001 The Effect of Deterministic and Stochastic VTG Schemes on the Application of Backpropagation to Multivariate Time Series Prediction. Search on Bibsonomy IEA/AIE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24In-Cheol Kim, Soon-Hee Myoung Text Categorization Using Hybrid Multiple Model Schemes. Search on Bibsonomy IDA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Randeep Bhatia, Rakesh K. Sinha, Chung-Min Chen Hierarchical Declustering Schemes for Range Queries. Search on Bibsonomy EDBT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Simon R. Blackburn, Mike Burmester, Yvo Desmedt, Peter R. Wild Efficient Multiplicative Sharing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
24Gagan Agrawal, Pankaj Jalote Coding-Based Replication Schemes for Distributed Systems. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
24Gösta Grahne, Kari-Jouko Räihä Dependency Characterizations for Acyclic Database Schemes. Search on Bibsonomy PODS The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
24Amos Korman, Shay Kutten Distributed verification of minimum spanning trees. Search on Bibsonomy Distributed Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Graph property verification, Proof labeling schemes, Self stabilization, Minimum spanning tree, Labeling schemes, Network algorithms
24Alina Chertock, Alexander Kurganov, Guergana Petrova Finite-Volume-Particle Methods for Models of Transport of Pollutant in Shallow Water. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Saint-Venant system of shallow water equations, transport of pollutant, finite-volume schemes, central-upwind schemes, balance laws, particle methods
24Ashoke Deb Multiskewing-A Novel Technique for Optimal Parallel Memory Access. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF pipelined/vector processors, linear schemes, memory bank conflict, memory bandwidth, periodic, matrix computation, conflict-free access, Interleaved memory, skewing schemes
24Mihir Bellare, Chanathip Namprempre, Gregory Neven Security Proofs for Identity-Based Identification and Signature Schemes. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Signatures, Identity-based cryptography, Identification schemes, Security proofs
24Gábor Ivanyos, Marek Karpinski, Nitin Saxena 0001 Schemes for deterministic polynomial factoring. Search on Bibsonomy ISSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF grh, schemes, polynomial factoring, representation theory
24George Karakostas Faster approximation schemes for fractional multicommodity flow problems. Search on Bibsonomy ACM Trans. Algorithms The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multicommodity flows, fully-polynomial time approximation schemes
24Diana Berbecaru, Luca Albertalli An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF generic FSS schemes, double cache technique, backward secrecy
24Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unbalanced Feistel permutations, generic attacks on encryption schemes, Block ciphers, pseudo-random permutations
24Ronan Cummins, Colm O'Riordan Evolved term-weighting schemes in Information Retrieval: an analysis of the solution space. Search on Bibsonomy Artif. Intell. Rev. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Information Retrieval, Genetic programming, Term-weighting schemes
24Susana Serna, Jianliang Qian Fifth-Order Weighted Power-ENO Schemes for Hamilton-Jacobi Equations. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ENO, Weighted Power-ENO, monotone schemes, level set, Hamilton-Jacobi
24Man Lan, Chew Lim Tan, Hwee-Boon Low, Sam Yuan Sung A comprehensive comparative study on term weighting schemes for text categorization with support vector machines. Search on Bibsonomy WWW (Special interest tracks and posters) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SVM, categorization, text, term weighting schemes
24Alvaro Munoz, Sanjeev Kumar Effect of Unbalanced Bursty Traffic on Memory-Sharing Schemes for Internet Switching Architecture. Search on Bibsonomy ICN (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Unbalanced bursty Traffic, Memory-Sharing Schemes, Shared Memory, Packet Switch
24Sang-Woon Kim, B. John Oommen Time-Varying Prototype Reduction Schemes Applicable for Non-stationary Data Sets. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Time Varying Samples (TVS), Nonstatinoary Environments, Hybrid-type Prototype Reduction, Prototype Reduction Schemes (PRS)
24Morten Hertzum Small-Scale Classification Schemes: A Field Study of Requirements Engineering. Search on Bibsonomy Comput. Support. Cooperative Work. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF small-scale classification, requirements engineering, coordination, requirements specification, cooperative work, conceptual design, classification schemes
24Weiyun Huang, Edward Omiecinski, Leo Mark Compression schemes for differential categorical stream clustering. Search on Bibsonomy CIKM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF compression schemes, stream, categorical, differential
24Jens-Matthias Bohli, Rainer Steinwandt On Subliminal Channels in Deterministic Signature Schemes. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF deterministic signature schemes, subliminal channels
24Sang-Woon Kim, B. John Oommen A brief taxonomy and ranking of creative prototype reduction schemes. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Learning Vector Quantisation (LVQ), Machine Learning, Support Vector Machines (SVM), Prototype Reduction Schemes (PRS)
24Leland Jameson AMR vs High Order Schemes. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF adaptive mesh refinement, numerical approximation, High order schemes
24Josef Pieprzyk, Xian-Mo Zhang Ideal Threshold Schemes from MDS Codes. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cheating Detection and Identification, Secret Sharing, Threshold Schemes
24Jean-Sébastien Coron Security Proof for Partial-Domain Hash Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Provable Security, Random Oracle Model, Signature Schemes
24Cyril Gavoille, Michal Katz, Nir A. Katz, Christophe Paul, David Peleg Approximate Distance Labeling Schemes. Search on Bibsonomy ESA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Local representations, approximate distance, distributed data structures, labeling schemes
24Leland Jameson High Order Schemes for Resolving Waves: Number of Points per Wavelength. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF numerical error, resolution, high order schemes
24Marc Fischlin Lower Bounds for the Signature Size of Incremental Schemes. Search on Bibsonomy FOCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF incremental schemes, signature size, substitution attacks, single block replacement, lower bounds, security of data
24Kang G. Shin, Chao-Ju Hou Analytic Models of Adaptive Load Sharing Schemes in Distributed Real-Time Systems. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF decentralised load sharing, continuous time semiMarkov process, adaptive load sharing schemes, nonuniform task arrivals, dynamic load sharing, random selection, cumulative execution time, commonly-used queue length, Bayesian decision mechanism, probability ofdynamic failure, simulation, real-time systems, distributed processing, queueing theory, analytic models, decision theory, Bayes methods, distributed real-time systems, queuing models, performanceevaluation
24Philip S. Yu, Daniel M. Dias Analysis of Hybrid Concurrency Control Schemes For a High Data Contention Environment. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF hybrid concurrency control schemes, hybrid CC, CC scheme, rerun transactions, dynamic locking, dynamic hybrid OCC, broadcast OCC, high data contention environment, decomposition approach, mean-value-type analysis, concurrency control, optimisation, transaction processing, analytic models, database theory, hybrid approach, optimistic concurrency control
24Hao Chen 0095, San Ling, Carles Padró, Huaxiong Wang, Chaoping Xing Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Vijay Erramilli, Mark Crovella Forwarding in opportunistic networks with resource constraints. Search on Bibsonomy Challenged Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile opportunistic networks, delay tolerant networks, pocket switched networks, forwarding algorithms
22Satish Penmatsa, Anthony T. Chronopoulos Dynamic Multi-User Load Balancing in Distributed Systems. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Chun-Yuan Lin, Yeh-Ching Chung, Jen-Shiuh Liu Efficient Data Compression Methods for Multi-Dimensional Sparse Array Operations. Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Data compression scheme, Sparse array operation, Multi-dimensional sparse array, Karnaugh Map
22Rajeev Sivaram, Ram Kesavan, Dhabaleswar K. Panda 0001, Craig B. Stunkel Architectural Support for Efficient Multicasting in Irregular Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cut-through routing, performance evaluation, multicast, broadcast, collective communication, Parallel computer architecture, irregular networks, switch-based networks
22Lata Narayanan, Jaroslav Opatrny Compact Routing on Chordal Rings of Degree 4. Search on Bibsonomy Algorithmica The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Compact routing schemes, Boolean routing, Distributed networks, Chordal rings, Interval routing
22Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini Secret Sharing in Multilevel and Compartmented Groups. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Hierarchical and Compartmented Access Structures, Ideal Schemes, Secret Sharing, Perfect Security
22Li-Shen Juhn, Li-Ming Tseng Fast broadcasting for hot video access. Search on Bibsonomy RTCSA The full citation details ... 1997 DBLP  DOI  BibTeX  RDF hot video access, pyramid broadcasting schemes, broadcasting, interactive television, multiple channels, set-top box, buffer requirement
22David J. Lilja, Pen-Chung Yew Improving Memory Utilization in Cache Coherence Directories. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF memory utilization, cache coherence directories, large-scale shared memorymultiprocessors, software-directed schemes, compile-time memory disambiguation, dynamically tagged directory, high-level sharing information, configurationmanagement, discrete event simulation, compiler optimizations, program compilers, shared memory systems, trace-driven simulations, buffer storage, storage allocation, interprocedural analysis
22Ke Wang, Marc H. Graham Constant-Time Maintainability: A Generalization of Independence. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF independent database schemes, representative instance, relational database, functional dependency, chase, tableau, join dependency, lossless join, constraint enforcement
22Xin Yu 0007, Ke Tang 0001, Tianshi Chen 0002, Xin Yao 0001 Empirical analysis of evolutionary algorithms with immigrants schemes for dynamic optimization. Search on Bibsonomy Memetic Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Immigrants scheme, Evolutionary Algorithm, Dynamic Optimization Problem
22Martin R. Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz Attacking cryptographic schemes based on "perturbation polynomials". Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF pairwise key establishment, random perturbation polynomial, sensor network security
22Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka Efficient Non-interactive Universally Composable String-Commitment Schemes. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF non-interactive string commitment, all-but-one trapdoor functions, homomorphism, universal composability
22Christian Ortolf, Christian Schindelhauer, Arne Vater Classifying peer-to-peer network coding schemes. Search on Bibsonomy SPAA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF peer-to-peer networks, network coding, bittorrent
22Emre A. Yavuz, Victor C. M. Leung Efficient Methods for Performance Evaluations of Call Admission Control Schemes in Multi-Service Cellular Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Anders Mykkeltveit, Bjarne E. Helvik Comparison of Schemes for Provision of Differentiated Availability-Guaranteed Services Using Dedicated Protection. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF QoS, availability, protection
22Chengqing Li, Guanrong Chen On the security of a class of image encryption schemes. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Jianhong Zhang, Cheng Ji On the Security of two Authenticated Encryption Schemes. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Amos Beimel, Matthew K. Franklin Weakly-Private Secret Sharing Schemes. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Debasis Giri, Parmeshwary Dayal Srivastava Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Attack, Timestamp, Nonce
22Yong Qin, Wenjun Xiao, Chenggui Zhao GDED-X Schemes for Load Balancing on Heterogeneous OTIS-Networks. Search on Bibsonomy ICA3PP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Steinar Evje, Tore Flåtten CFL-Violating Numerical Schemes for a Two-Fluid Model. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Subject Classification 76T10, 76N10, 35L65, 65M12
22Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA assumptions, public key encryption, chosen-ciphertext security
22Yang Xiang 0001, Zhongwen Li, Hong Chen Optimizing Adaptive Checkpointing Schemes for Grid Workflow Systems. Search on Bibsonomy GCC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Krishanthmohan Ratnam, Mohan Gurusamy, Luying Zhou Rerouting Schemes with Inter-layer Backup Resource Sharing for Differentiated Survivability in IP-over-WDM Optical Networks. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Uri M. Ascher, Robert I. McLachlan On Symplectic and Multisymplectic Schemes for the KdV Equation. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Symplectic method, multisymplectic method, Korteweg-de Vries equation, box scheme, Hamiltonian system
22Amos Korman General Compact Labeling Schemes for Dynamic Trees. Search on Bibsonomy DISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Carlo Blundo, Sebastià Martín Molleví, Barbara Masucci, Carles Padró A Linear Algebraic Approach to Metering Schemes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF distributed audit, cryptography, entropy, secret sharing, metering
22Alfredo De Santis, Barbara Masucci Anonymous Membership Broadcast Schemes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anonymity, permutation groups, pseudorandom permutations
22Sangheon Pack, Taekyoung Kwon 0001, Yanghee Choi A comparative study of mobility anchor point selection schemes in hierarchical mobile IPv6 networks. Search on Bibsonomy Mobility Management & Wireless Access Protocols The full citation details ... 2004 DBLP  DOI  BibTeX  RDF MAP selection, mobility anchor point, performance comparison, hierarchical mobile IPv6
22Wen-Chih Peng, Ming-Syan Chen Developing Data Allocation Schemes by Incremental Mining of User Moving Patterns in a Mobile Computing System. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF user moving patterns, data allocation scheme, Data mining, mobile computing, mobile database
22Ron Steinfeld, Joonsang Baek, Yuliang Zheng 0001 On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Dawn Xiaodong Song Practical forward secure group signature schemes. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Goichiro Hanaoka, Junji Shikata, Yuliang Zheng 0001, Hideki Imai Unconditionally Secure Digital Signature Schemes Admitting Transferability. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22Edward P. F. Chan, Héctor J. Hernández Independence-reducible Database Schemes. Search on Bibsonomy PODS The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
22Zohar Manna, Amir Pnueli Synchronous Schemes and Their Decision Problems. Search on Bibsonomy POPL The full citation details ... 1980 DBLP  DOI  BibTeX  RDF
22Klim Efremenko 3-query locally decodable codes of subexponential length. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PIR schemes, private information retrieval schemes, locally decodable codes
22László Csirmaz The Size of a Share Must Be Large. Search on Bibsonomy J. Cryptol. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Polymatroid structures, Polymatroid structures, Secret sharing, Secret sharing, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Perfect security, Perfect security
22 A visualization tool for tutoring the interactive learning of data structures and algorithmic schemes. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF algorithmic schemes, data structures, computer science education
22Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez On Some Weaknesses in the Disk Encryption Schemes EME and EME2. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Tweakable Enciphering Schemes, Disc Encryption, EME, Modes of operation
22Nicole Immorlica, Mohammad Mahdian, Vahab S. Mirrokni Limitations of cross-monotonic cost-sharing schemes. Search on Bibsonomy ACM Trans. Algorithms The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cross-monotonic cost-sharing schemes, group-strategyproof mechanism design, probabilistic method
22Amos Korman, David Peleg Dynamic routing schemes for graphs with low local density. Search on Bibsonomy ACM Trans. Algorithms The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed algorithms, dynamic networks, Routing schemes
22Chi-Tien Lin, Xu-Dong Liu Convex ENO Schemes for Hamilton-Jacobi Equations. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Convex ENO schemes, conservation laws, Hamilton-Jacobi equations
22Jichun Li 0001, Miguel R. Visbal High-order Compact Schemes for Nonlinear Dispersive Waves. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF high-order compact schemes, KdV equation, KdV-Burgers equation, dispersive wave
22Jaume Martí-Farré, Carles Padró Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ideal access structures, Secret sharing representable matroids, Secret sharing, Ideal secret sharing schemes, Information rate
22Chris Reed 0001, Douglas Walton Towards a Formal and Implemented Model of Argumentation Schemes in Agent Communication. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF knowledge representation, argumentation, schemes
22Eleuterio F. Toro, Vladimir A. Titarev TVD Fluxes for the High-Order ADER Schemes. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ADER, essentially non-oscillatory, generalised Riemann problem, flux expansion, TVD flux, WAF flux, high-order schemes
22Bachuki Mesablishvili Descent Theory for Schemes. Search on Bibsonomy Appl. Categorical Struct. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF quasi-coherent module, indexed category, (effective) descent morphism, pure morphism of schemes, scheme
22Daniele Miorandi, Andrea Zanella, Gianfranco L. Pierobon Performance Evaluation of Bluetooth Polling Schemes: An Analytical Approach. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF polling schemes, equilibrium point analysis, performance evaluation, Bluetooth
22Tim Broeckhoven, Sergey Smirnov 0003, Jan Ramboer, Chris Lacor Finite Volume Formulation of Compact Upwind and Central Schemes with Artificial Selective Damping. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Artificial selective damping, Non-uniform meshes, Compact schemes
22Xiangang Zhang, Gregory A. Blaisdell, Anastasios S. Lyrintzis High-Order Compact Schemes with Filters on Multi-block Domains. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-block, compact difference schemes, compact filters
22Kamilla Klonowska, Lars Lundberg, Håkan Lennerstad, Charlie Svahnberg Using Modulo Rulers for Optimal Recovery Schemes in Distributed Computing. Search on Bibsonomy PRDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF recovery schemes, modulo sequence, fault tolerance, high performance computing, Golomb rulers
22Mingyan Li, Radha Poovendran Broadcast Enforced Threshold Schemes with Disenrollment. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF threshold schemes with disenrollment, entropy, secret sharing
22Gennaro Coppola, Carlo Meola Generalization of the Spline Interpolation Based on the Principle of the Compact Schemes. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF spline interpolation, compact schemes
22Adi Shamir, Yael Tauman Improved Online/Offline Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF on-line/off-line, trapdoor hash functions, signature schemes
22Hua-Zhong Tang, Kun Xu 0001 Positivity-Preserving Analysis of Explicit and Implicit Lax-Friedrichs Schemes for Compressible Euler Equations. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Lax-Friedrichs (LxF) schemes, positivity, Euler equations
22Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF cryptography, computer security, secret sharing, threshold schemes, group oriented cryptography
22Saul Abarbanel, Ajay Kumar Compact high-order schemes for the Euler equations. Search on Bibsonomy J. Sci. Comput. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF approximate factorization, Euler equations, shock waves, compact schemes
21Shujin Lin, Fang You, Xiaonan Luo, Zheng Li Deducing interpolating subdivision schemes from approximating subdivision schemes. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF approximating subdivision, interpolating subdivision
21Mikio Yagi, Keiichi Kaneko, Hideo Ito LLT and LTn Schemes: Error Recovery Schemes in Mobile Environments. Search on Bibsonomy PRDC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee Efficient Public Key Broadcast Encryption Using Identifier of Receivers. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Wensheng Zhang 0001, Guohong Cao Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Jongin Lim 0001, Kilsoo Chun Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 37120 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license