The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for MACs with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1990-1997 (17) 1998-2000 (16) 2001-2003 (21) 2004-2005 (44) 2006-2007 (32) 2008 (32) 2009 (22) 2010-2011 (18) 2012-2013 (23) 2014 (22) 2015-2016 (18) 2017-2018 (23) 2019 (17) 2020-2021 (22) 2022-2023 (25) 2024 (2)
Publication types (Num. hits)
article(127) incollection(1) inproceedings(225) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 194 occurrences of 134 keywords

Results
Found 355 publication records. Showing 354 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
13Ren Xiu-li, Liang Hong-wei, Wang Yu Multipath Routing Based on Ant Colony System in Wireless Sensor Networks. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Atsushi Mitsuda, Tetsu Iwata Tweakable Pseudorandom Permutation from Generalized Feistel Structure. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Luby-Rackoff theory, generalized Feistel structure, security proofs, tweakable blockcipher
13Dominik Dietrich, Ewaryst Schulz, Marc Wagner 0001 Authoring Verified Documents by Interactive Proof Construction and Verification in Text-Editors. Search on Bibsonomy AISC/MKM/Calculemus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Yung Yi, Sanjay Shakkottai Hop-by-hop congestion control over a wireless multi-hop network. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF control theory, mathematical programming/optimization
13Jennifer Price, Tara Javidi Leveraging Downlink for Efficient Uplink Allocation in a Single-Hop Wireless Network. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Min Dong 0001, Lang Tong, Brian M. Sadler Information Retrieval and Processing in Sensor Networks: Deterministic Scheduling Versus Random Access. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Ketan Mandke, Soon-Hyeok Choi, Gibeom Kim, Robert Grant, Robert C. Daniels, Wonsoo Kim, Robert W. Heath Jr., Scott Nettles Early Results on Hydra: A Flexible MAC/PHY Multihop Testbed. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Jukka Suhonen, Mikko Kohvakka, Mauri Kuorilehto, Marko Hännikäinen, Timo D. Hämäläinen Cost-aware capacity optimization in dynamic multi-hop WSNs. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Larry Bull, Toby O'Hara, Pier Luca Lanzi Anticipation mappings for learning classifier systems. Search on Bibsonomy IEEE Congress on Evolutionary Computation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Chih-Chun Chang, David J. Nagel, Sead Muftic Balancing Security and Energy Consumption in Wireless Sensor Networks. Search on Bibsonomy MSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF energy cost, security, Wireless sensor networks (WSN), measurement, experimentation
13Omar Ochoa, Irbis Gallegos, Steve Roach, Ann Q. Gates Towards a Tool for Generating Aspects from MEDL and PEDL Specifications for Runtime Verification. Search on Bibsonomy RV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Java-MaC, Aspect Oriented Programming, Runtime Verification, Runtime Monitoring, Software Assurance
13Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan Castor: Secure Code Updates Using Symmetric Cryptosystems. Search on Bibsonomy RTSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Tai-Wen Yue, Zou Zhong Lee A Q'tron Neural-Network Approach to Solve the Graph Coloring Problems. Search on Bibsonomy ICTAI (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Johannes Lessmann GMAC: A Position-Based Energy-Efficient QoS TDMA MAC for Ad Hoc Networks. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan Exploring Symmetric Cryptography for Secure Network Reprogramming. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Kentaro Ishizu, Yoshia Saito, Zhou Lan, Masahiro Kuroda Adaptive wireless-network testbed for cognitive radio technology. Search on Bibsonomy WINTECH The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unlicensed, simulation, Java, wireless network, MAC, cognitive radio, software defined radio, experimental system
13Peter T. Hraber, Bette T. Korber, Steven Wolinsky, Henry A. Erlich, Elizabeth A. Trachtenberg, Thomas B. Kepler HLA and HIV Infection Progression: Application of the Minimum Description Length Principle to Statistical Genetics. Search on Bibsonomy ISBMDA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Giuseppe Caizzone, Paolo Giacomazzi, Luigi Musumeci, Gabriella Saddemi, Giacomo Verticale Performance Analysis of a Flexible MAC Protocol for Real-Time Services in Vehicular Ad-Hoc Networks. Search on Bibsonomy Int. J. Wirel. Inf. Networks The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ad-hoc networks, TDMA, vehicular communications
13Jung L. Lee, Myung Hoon Sunwoo Implementation of a Wireless Multimedia DSP Chip for Mobile Applications. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multimedia, DSP, instruction
13Jihye Kim, Gene Tsudik SRDP: Securing Route Discovery in DSR. Search on Bibsonomy MobiQuitous The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13William Eric Hall, Charanjit S. Jutla Parallelizable Authentication Trees. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Jennifer Hallinan Evolving Neural Networks for the Classification of Malignancy Associated Changes. Search on Bibsonomy IDEAL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Sheng Tang, Jin-Tao Li 0001, Yong-Dong Zhang 0001 Compact and Robust Image Hashing. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13David A. McGrew Efficient Authentication of Large, Dynamic Data Sets Using Galois/Counter Mode (GCM). Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Wei Ye 0003, John S. Heidemann, Deborah Estrin Medium access control with coordinated adaptive sleeping for wireless sensor networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sensor network, wireless network, energy efficiency, medium access control (MAC)
13Nicolas Brisebarre, Jean-Michel Muller, Saurabh Kumar Raina Accelerating Correctly Rounded Floating-Point Division when the Divisor Is Known in Advance. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Frank-Rene Schaefer SäferTEX: Source Code Esthetics for Automated Typesetting. Search on Bibsonomy TEX, XML, and Digital Typography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13David Przybyla, Karissa Miller, Mahmoud Pegah A holistic approach to high-performance computing: xgrid experience. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF xgrid, cluster, grid computing, high-performance computing, rendering, rendezvous, Macintosh OS X
13Crystal R. Miller, Henry R. Bent OS X: a ten-step program. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF OS X, public laboratories, radmind, printing, Macintosh
13Dai Watanabe, Soichi Furuya A MAC Forgery Attack on SOBER-128. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SOBER, Stream cipher, Differential cryptanalysis, Message Authentication Code
13Jing Deng 0002, Richard Han 0001, Shivakant Mishra A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Jos Sulistyo, Dong Sam Ha 5 GHz pipelined multiplier and MAC in 0.18µm complementary static CMOS. Search on Bibsonomy ISCAS (5) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Harri Lampinen, Pauli Perälä, Olli Vainio Design of a self-timed asynchronous parallel FIR filter using CSCD. Search on Bibsonomy ISCAS (5) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Tetsu Iwata, Kaoru Kurosawa Stronger Security Bounds for OMAC, TMAC, and XCBC. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Bruno Raffin, Marcelo Knörich Zuffo, Hank Kerzmarski, Zhingeng Pan Commodity Clusters for Virtual Reality. Search on Bibsonomy VR The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Éliane Jaulmes, Antoine Joux, Frédéric Valette On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca A System to Specify and Manage Multipolicy Access Control Models. Search on Bibsonomy POLICY The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Charles C. Y. Lam, Guang Gong, Scott A. Vanstone Message Authentication Codes with Error Correcting Capabilities. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Error Correcting Codes, Message Authentication Codes
13Mehmet Kivanç Mihçak, Ramarathnam Venkatesan New Iterative Geometric Methods for Robust Perceptual Image Hashing. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Asa Elkins, Jeffery W. Wilson, Denis Gracanin Security issues in high level architecture based distributed simulation. Search on Bibsonomy WSC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Dan Boneh, Shai Halevi, Nick Howgrave-Graham The Modular Inversion Hidden Number Problem. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Coppersmith's attack, Approximations, MAC, Lattices, PRNG, Modular inversion, Hidden number problems
13Mehmet Kivanç Mihçak, Ramarathnam Venkatesan A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding. Search on Bibsonomy Information Hiding The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Dean E. Dauger, Viktor K. Decyk Numerically-Intensive "Plug-and-Play" Parallel Computing. Search on Bibsonomy CLUSTER The full citation details ... 2001 DBLP  DOI  BibTeX  RDF AppleSeed, plug and play, MacMPI, Pooch, easy, parallel computing, GUI, MPI, cluster computing, Unix, technology transfer, Macintosh, PowerPC, ease of use, Apple, Mac, plasma physics, AltiVec
13Oliver Brand, Leo Petrak, Dirk Sturzebecher, Martina Zitterbart Supporting Tele-Teaching: Visualization Aspects. Search on Bibsonomy EUROMICRO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13R. V. K. Pillai, Dhamin Al-Khalili, Asim J. Al-Khalili Power implications of precision limited arithmetic in floating point FIR filters. Search on Bibsonomy ISCAS (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
13John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway UMAC: Fast and Secure Message Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
13Katy Börner CBR for Design. Search on Bibsonomy Case-Based Reasoning Technology The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
13Simon N. Foley External Consistency and the Verification of Security Protocols (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
13Alex L. Hayzelden, John Bigham Heterogeneous Multi-Agent Architecture for ATM Virtual Path Network Resource Configuration. Search on Bibsonomy IATA The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
13Bart Preneel Cryptographic Primitives for Information Authentication - State of the Art. Search on Bibsonomy State of the Art in Applied Cryptography The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
13Valentine Afanassiev, Christian Gehrmann, Ben J. M. Smeets Fast Message Authentication Using Efficient Polynomial Evaluation. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
13D. V. Poornaiah, P. V. Ananda Mohan Design of a 3-bit Booth recoded novel VLSI concurrent multiplier-accumulator architecture. Search on Bibsonomy VLSI Design The full citation details ... 1995 DBLP  DOI  BibTeX  RDF concurrent multiplier-accumulator architecture, second order modified Booth algorithm, sign extension bits minimization algorithm, sign-bit updating algorithm, multi-bit recoded parallel multipliers, computation time reduction, CMOS standard cell technology, 35 ns, 50 pF, parallel algorithms, VLSI, VLSI, parallel architectures, digital arithmetic, multiplication, CMOS logic circuits, multiplying circuits, accumulation, 1 micron
13Takashi Miyazaki, Takao Nishitani, Masato Edahiro, Ikuko Ono, Kaoru Mitsuhashi DCT/IDCT processor for HDTV developed with dsp silicon compiler. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
13Grace Ruiz Little Establishing a graphics standard. Search on Bibsonomy SIGUCCS The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #354 of 354 (100 per page; Change: )
Pages: [<<][1][2][3][4]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license