The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for symmetric with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1952-1961 (18) 1962-1963 (15) 1964-1966 (21) 1967-1968 (21) 1969-1970 (17) 1971-1972 (27) 1973 (20) 1974-1975 (22) 1976-1977 (29) 1978 (18) 1979 (17) 1980 (21) 1981 (15) 1982 (21) 1983 (19) 1984 (38) 1985 (42) 1986 (36) 1987 (37) 1988 (63) 1989 (59) 1990 (88) 1991 (91) 1992 (104) 1993 (126) 1994 (120) 1995 (137) 1996 (144) 1997 (158) 1998 (179) 1999 (219) 2000 (267) 2001 (285) 2002 (343) 2003 (378) 2004 (467) 2005 (664) 2006 (758) 2007 (808) 2008 (796) 2009 (656) 2010 (422) 2011 (447) 2012 (430) 2013 (487) 2014 (453) 2015 (512) 2016 (517) 2017 (599) 2018 (679) 2019 (733) 2020 (716) 2021 (794) 2022 (827) 2023 (833) 2024 (204)
Publication types (Num. hits)
article(9805) book(8) data(1) incollection(53) inproceedings(6038) phdthesis(110) proceedings(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 4577 occurrences of 2526 keywords

Results
Found 16017 publication records. Showing 16017 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Igor E. Kaporin, Igor N. Konshin Load Balancing of Parallel Block Overlapped Incomplete Cholesky Preconditioning. Search on Bibsonomy PaCT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF symmetric positive definite matrix, incomplete Cholesky factorization, parallel preconditioning, conjugate gradient method
16Ayesha Naureen, Attiya Akram, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Symmetric Key Cryptography (SKC), Security, Wireless Sensor Network (WSN), Key Management, Public Key Cryptography (PKC)
16Marian Srebrny, Piotr Such Statistical Strength of a Hybrid Cryptosystem on 2-D Cellular Automata with Nonaffine Rotations. Search on Bibsonomy KES-AMSTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-agent security, intelligent multicore computation, random bit generators, cellular automata, statistical tests, cryptology, symmetric cipher
16Jean-Charles Faugère, Sajjad Rahmany Solving systems of polynomial equations with symmetries using SAGBI-Gröbner bases. Search on Bibsonomy ISSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF invariant ring, sagbi-groebner, symmetric polynomials, groebner basis, f5 algorithm
16Benjamin G. Jackson, Patrick S. Schnable, Srinivas Aluru Consensus Genetic Maps as Median Orders from Inconsistent Sources. Search on Bibsonomy IEEE ACM Trans. Comput. Biol. Bioinform. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Genetic map, median order, path and circuit problems, Kemeny distance, symmetric difference distance
16LingWei Chu, Shihong Zou, Shiduan Cheng, Wendong Wang Active probing based Internet service fault management in uncertain and noisy environment. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bipartite Bayesian network, service management, fault management, active probing, binary symmetric channel
16Quazi Ehsanul Kabir Mamun, Sita Ramakrishnan SecCOSEn - A Key Management Scheme for Securing Chain Oriented Sensor Networks. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF partial key, WSN, Key management, key pre-distribution, symmetric cryptography
16Mohammad Al-Shurman, Seong-Moo Yoo, Bonam Kim Distributive Key Management for Mobile Ad Hoc Networks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ad hoc networks, threshold cryptography, mobile security, symmetric key, MDS code
16Seyit Ahmet Çamtepe, Bülent Yener Combinatorial design of key distribution mechanisms for wireless sensor networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF combinatorial design theory, generalized quadrangles (GQ), key pre-distribution (deterministic and hybrid), key-chains, security in wireless sensor networks (WSN), symmetric balanced incomplete block design (BIBD), key management
16Jinhai Chen, Weiguo Li Equivalent Conditions for Convergence of Splittings of Non-Hermitian Indefinite Matrices. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Non-Hermitian matrix, Indefinite matrix, Convergent splitting, Matrix with a dominant symmetric part
16Christopher Ostler, Karam S. Chatha, Goran Konjevod Approximation Algorithm for Process Mapping on Network Processor Architectures. Search on Bibsonomy ASP-DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intel IXP2400 architecture, programmable network processor architectures, symmetric multiprocessing, automated system-level design, NP-complete problem, process mapping, polynomial time approximation algorithm, block multithreading
16Nengchao Wang, Jianhua Lu, Baochang Shi Walsh Function Systems: The Bisectional Evolutional Generation Pattern. Search on Bibsonomy ICES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Quasi-Hadamard ordering, Bisectional Evolutional Pattern, Symmetric copying, Walsh function
16Navid Imani, Hamid Sarbazi-Azad, Selim G. Akl Resource Placement in Networks Using Chromatic Sets of Power Graphs. Search on Bibsonomy CSR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Symmetric graphs, Power graphs, Interconnection networks, Chromatic number, Resource placement
16Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yaotsu Chang The Secure DAES Design for Embedded System Application. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch number, repeating property, symmetric encryption algorithms, embedded system, Advanced Encryption Standard, data security
16Abedelaziz Mohaisen, YoungJae Maeng, DaeHun Nyang On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network. Search on Bibsonomy PAKDD Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bivariate Symmetric Polynomials, Sensor Networks, Key Distribution, Network Connectivity
16Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo An Efficient Authentication Protocol for Low-Cost RFID Systems. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, Authentication, RFID, location privacy, symmetric encryption
16Rogelio Hasimoto-Beltrán, Edmar Mota-Garcia Real-Time Secure Multimedia Communication System Based on Chaos Theory. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Discrete chaotic encryption, Block ciphers, symmetric encryption
16Inderjit S. Dhillon, Beresford N. Parlett, Christof Vömel The design and implementation of the MRRR algorithm. Search on Bibsonomy ACM Trans. Math. Softw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multiple relatively robust representations, design, implementation, eigenvalues, eigenvectors, LAPACK, symmetric matrix, numerical software
16David C. Thompson 0001, Philippe P. Pébay Embarrassingly parallel mesh refinement by edge subdivision. Search on Bibsonomy Eng. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Adaptive tetrahedral tessellation, Parallel mesh refinement, Streaming subdivision, Symmetric groups
16Alfredo Remón, Enrique S. Quintana-Ortí, Gregorio Quintana-Ortí Parallel LU Factorization of Band Matrices on SMP Systems. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multithreaded BLAS, Symmetric Multiprocessor (SMP), LAPACK, LU factorization, Band matrix
16Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis Lower Bounds on Sequence Complexity Via Generalised Vandermonde Determinants. Search on Bibsonomy SETA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF filter functions, linear feedbak shift registers, Vandermonde determinants, linear complexity, Binary sequences, symmetric functions
16Valery Pryamikov Enciphering with Arbitrary Small Finite Domains. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Block Ciphers, Modes of Operations, Symmetric Encryption, Pseudorandom Permutations
16Hamed Rahimov, Mohammad Reza Jahed-Motlagh, Nasser Mozayani A New Learning Method for S-GCM. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Chaotic Associative Memory, Symmetric Globally Coupled Map (S-GCM), More Iterate More Store (MIMS) Learning
16Bjarne Stig Andersen, John A. Gunnels, Fred G. Gustavson, John K. Reid, Jerzy Wasniewski A fully portable high performance minimal storage hybrid format cholesky algorithm. Search on Bibsonomy ACM Trans. Math. Softw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cholesky factorization and solution, complex Hermitian matrices, novel packed-matrix data structures, real symmetric matrices, BLAS, recursive algorithms, linear systems of equations, positive-definite matrices
16Eugene Goldberg Testing satisfiability of CNF formulas by computing a stable set of points. Search on Bibsonomy Ann. Math. Artif. Intell. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF stable set of points, symmetric CNF formulas, satisfiability problem
16Xiaoqiang Zheng, Beresford N. Parlett, Alex Pang Topological Lines in 3D Tensor Fields and Discriminant Hessian Factorization. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF real symmetric tensors, degenerate tensors, tensor topology, Hyperstreamlines
16Peng Wang 0009, Dengguo Feng, Wenling Wu HCTR: A Variable-Input-Length Enciphering Mode. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF disk sector encryption, modes of operation, symmetric encryption, Blockcipher, tweakable blockcipher
16Gyu Sang Choi, Jin-Ha Kim, Deniz Ersoz, Chita R. Das A multi-threaded PIPELINED Web server architecture for SMP/SoC machines. Search on Bibsonomy WWW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF asynchronous multi-process event-driven, single event-driven process, symmetric multi-processor, system-on-chip, multi-thread, multi-process
16Roger Fletcher A New Low Rank Quasi-Newton Update Scheme for Nonlinear Programming. Search on Bibsonomy System Modelling and Optimization The full citation details ... 2005 DBLP  DOI  BibTeX  RDF symmetric rank one, filter, nonlinear programming, quasi-Newton, limited memory, SQP
16Peng Wang 0009, Dengguo Feng, Wenling Wu On the Security of Tweakable Modes of Operation: TBC and TAE. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher
16Xiaohan Wang, Xiaolin Wu 0001 Optimal packetization of VLC and convolution coded Markov sequences. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF optimal packetization scheme, convolution coded Markov sequence, minimum expected distortion, weighted directed acyclic graph, dynamic programming, joint source-channel coding, variable length code, VLC, binary symmetric channel
16Xiaoqiang Zheng, Alex Pang 2D Asymmetric Tensor Analysis. Search on Bibsonomy IEEE Visualization The full citation details ... 2005 DBLP  DOI  BibTeX  RDF general tensors, symmetric tensors, degenerate tensors, topological lines, critical points, tensor topology, hyperstreamlines
16Jong Youl Choi, Markus Jakobsson, Susanne Wetzel Balancing auditability and privacy in vehicular networks. Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF light-weight, privacy, incentive, audit, symmetric
16Shahzad Malik, Abhishek Ranjan, Ravin Balakrishnan Interacting with large displays from a distance with vision-tracked multi-finger gestural input. Search on Bibsonomy UIST The full citation details ... 2005 DBLP  DOI  BibTeX  RDF from afar, large wall, multi-point, touch surface, two hands, visual touchpad, interaction, gesture, symmetric, bimanual, asymmetric
16Raphael A. Hauser The Nesterov-Todd Direction and Its Relation to Weighted Analytic Centers. Search on Bibsonomy Found. Comput. Math. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Symmetric cones, Self-scaled programming, Nesterov-Todd direction, Weighted analytic centers, Target map, Magnus series, Orthogonal flow, Interior point methods
16Appu Muthusamy On Resolvable Multipartite G-Designs. Search on Bibsonomy Graphs Comb. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cycle-factorization, Wreath product of graphs, Complete symmetric k-partite multi-digraph, Resesolvable multipartite G-design
16Andris Ambainis, Markus Jakobsson, Helger Lipmaa Cryptographic Randomized Response Techniques. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF randomized response technique, privacy, privacy-preserving data-mining, oblivious transfer, polling, binary symmetric channel
16Xiaoqiang Zheng, Alex Pang Topological Lines in 3D Tensor Fields. Search on Bibsonomy IEEE Visualization The full citation details ... 2004 DBLP  DOI  BibTeX  RDF real symmetric tensors, degenerate tensors, topological lines, tensor topology, hyperstreamlines
16Yukiko Kubo, Hiroshi Miyashita, Yoji Kajitani, Kazuyuki Tateishi Equidistance routing in high-speed VLSI layout design. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF box routing, equidistance routing, rectilinear route, slant symmetric grid, dynamic programming, VLSI system, channel routing
16Knut-Andreas Lie, Sebastian Noelle An Improved Quadrature Rule for the Flux-Computation in Staggered Central Difference Schemes in Multidimensions. Search on Bibsonomy J. Sci. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Multidimensional conservation laws, nonoscillatory central schemes, radially symmetric solutions, space-time quadrature
16André Weimerskirch, Dirk Westhoff Zero Common-Knowledge Authentication for Pervasive Networks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key-Chains, Ad-hoc Networks, Authentication, Public-Key, Symmetric Ciphers, Pervasive Networks
16Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette Authenticated On-Line Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks
16Kishan Chand Gupta, Palash Sarkar 0001 Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF bilinear form, symplectic matrix, nonlinearity, S-box, bent function, symmetric ciphers, SAC
16John K. Reid, Jennifer A. Scott Implementing Hager's exchange methods for matrix profile reduction. Search on Bibsonomy ACM Trans. Math. Softw. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Sparse symmetric matrices, exchange method, matrix profile
16Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman Differential and Linear Cryptanalysis of a Reduced-Round SC2000. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Symmetric block cipher, SC2000, linear attack, probability, differential attack, characteristic
16Hitoshi Yanami, Takeshi Shimoyama Differential Cryptanalysis of a Reduced-Round SEED. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF symmetric block cipher, probability, differential attack, characteristic, SEED
16Shantaram Vasikarla, Madasu Hanmandlu Contour Based Matching Technique for 3D Object Recognition. Search on Bibsonomy ITCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Quarternions, Euler parameters, Rotationally symmetric surfaces, Matching, Range data
16John Black, Phillip Rogaway Ciphers with Arbitrary Finite Domains. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Provable security, Modes of Operation, Symmetric Encryption, Ciphers
16Myungsun Kim, Jongseong Kim, Kwangjo Kim Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF asymmetric and symmetric fingerprinting, Bilinear Diffie-Hellman problem, Security reduction, Anonymous, Intellectual property protection
16Erxiong Jiang An Extension of the Roots Separation Theorem. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF symmetric tridiagonal matrix, interlace theorem, eigenvalue problem, divide-and-conquer method
16Manfred Göbel Visualizing Properties of Comprehensive SAGBI Bases - Two Examples. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Algorithmic invariant theory, Comprehensive SAGBI bases, Alternating and symmetric groups, Conjugation
16Sajal K. Das 0001, Daniel J. Harvey, Rupak Biswas Parallel Processing of Adaptive Meshes with Load Balancing. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF job migration and redistribution, symmetric broadcast networks, unstructured mesh adaptation, Dynamic load balancing, experimental study, IBM SP2
16Michal Krízek, Jan Nemec, Tomás Vejchodský A Posteriori Error Estimates for Axisymmetric and Nonlinear Problems. Search on Bibsonomy Adv. Comput. Math. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF weighted Sobolev spaces, axially symmetric problems, nonlinear problems, effectivity index, finite elements, a posteriori error estimates
16Giuseppe Ateniese, Stefan Mangard A new approach to DNS security (DNSSEC). Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF domain name system security (DNSSEC), digital signatures, authentication protocols, symmetric encryption
16M. R. Darafsheh, Mohammad Reza Pournaki Computation of the Dimensions of Symmetry Classes of Tensors Associated with the Finite two Dimensional Projective Special Linear Group. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Symmetry classes of tensors, Actions of symmetric groups, Irreducible characters, Projective special linear group
16Yong Yan 0003, Xiaodong Zhang 0001, Zhao Zhang 0010 Cacheminer: A Runtime Approach to Exploit Cache Locality on SMP. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF symmetric multiprocessors (SMP) and task scheduling, simulation, runtime systems, nested loops, Cache locality
16Boris Stilman Linguistic Geometry for Solving War Games. Search on Bibsonomy Computers and Games The full citation details ... 2000 DBLP  DOI  BibTeX  RDF war games, symmetric/asymmetric war games, linguistic geometry, reduced search, strategies, search problems, board games
16Hideki Imai, Atsuhiro Yamagishi CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cryptographic technology, asymmmetric ciphers, evaluation, symmetric ciphers
16Krishna Kant 0001, Youjip Won Server Capacity Planning for Web Traffic Workload. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF caching/proxy server, band-width requirements, Web server, self-similarity, symmetric multiprocessors, traffic characterization
16John R. Douceur, William J. Bolosky Progress-based regulation of low-importance processes. Search on Bibsonomy SOSP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF process priority, progress-based feedback, symmetric resource contention
16Mihir Bellare, Phillip Rogaway On the Construction of Variable-Input-Length Ciphers. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Provable Security, Modes of Operation, Symmetric Encryption, Ciphers
16Jan Flusser, Tomás Suk Degraded Image Analysis: An Invariant Approach. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Degraded image, symmetric blur, blur invariants, combined invariants, object recognition, image moments
16Hiroshi Sawada, Shigeru Yamashita, Akira Nagoya Restructuring Logic Representations with Easily Detectable Simple Disjunctive Decompositions. Search on Bibsonomy DATE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF simple disjunctive decomposition, symmetric variables, multi-level logic circuit, ordered binary decision diagram
16Mark Ettinger Steganalysis and Game Equilibria. Search on Bibsonomy Information Hiding The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Active Warden Attack, Cryptanalysis, Steganalysis, Shannon Entropy, Equilibria, Binary Symmetric Channel
16Elisa Sayrol Modeling the Displaced Frame Difference as an Alpha-Stable Distribution. Search on Bibsonomy ICIP (2) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF symmetric alpha-stable distributions, robust motion estimation, image sequences, image sequences, probabilistic model, probability density functions, Gaussian distribution, image regions, displaced frame difference
16Andreas Teuner, Olaf Pichler, José Emilio Santos Conde, Bedrich J. Hosticka Orientation- and scale-invariant recognition of textures in multi-object scenes. Search on Bibsonomy ICIP (3) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF scale-invariant recognition, orientation-invariant recognition, multi-object scenes segmentation, scale-invariant detection, textured objects, rotation angles identification, scale rates, reference texture features, polar-log Gabor filter bank, texture identification, symmetric phase only matched filters, feature space shifts, time-frequency functions, performance, database, image recognition, simulation results, image texture, image texture, dilation, texture segmentation
16Dennis F. Dunn, Niloufer E. Mathew Extracting Color Halftones from Printed Documents Using Texture Analysis. Search on Bibsonomy ICIP (1) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF color halftones, printed documents, processing requirements, grayscale, fixed lattice, invisible texture, spectral component, circularly-symmetric bandpass filter, document image processing, texture analysis, page, text, image rotations, dot pattern
16Jaeyoung Choi, Sung-Hoon Moon A parallel Cholesky factorization routine with a new version of PB-BLAS. Search on Bibsonomy ICPADS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF parallel Cholesky factorization routine, PB-BLAS, Parallel Block Basic linear Algebra Subprograms, block cyclic data distribution, memory space management, PB-BLAS routine performance, Hermitian matrix, triangular matrix, high performance linear algebra routine library, Intel Paragon computer, distributed memory systems, distributed-memory systems, symmetric matrix, ScaLAPACK, data decomposition
16Michael Stillger, Johann K. Obermaier, Johann Christoph Freytag AQuES: An Agent-based Query Evaluation System. Search on Bibsonomy CoopIS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF AQuES, agent-based query evaluation system, heterogeneous hardware modules, agent-based query optimization, independent data parallelism, dynamic execution strategies, distributed symmetric processes, distributed query execution, parallel algorithms, distributed databases, distributed database, cooperative system, resource scheduling, parallel database, runtime, algebra operators, database optimization
16Edward D. Moreno, Sergio Takeo Kofuji Efficiency of remote access caches in future SMP-based CC-NUMA multiprocessors: initial results. Search on Bibsonomy ISPAN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF shared remote access cache, future SMP based CC-NUMA multiprocessors, symmetric multiprocessor nodes, future architectures, realistic hardware parameters, state of the art systems components, SPLASH-2 benchmark suite, performance application, baseline architecture, approach-1, slow network, approach-2, fast network, 32-processor system, four-processor SMP nodes, two-processor SMP nodes, multiprocessing systems, execution time, cost effectiveness
16David A. Bader, Joseph F. JáJá, David Harwood, Larry S. Davis Parallel Algorithms for Image Enhancement and Segmentation by Region Growing with an Experimental Study. Search on Bibsonomy IPPS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Symmetric Neighborhood Filter, Parallel Algorithms, Image Processing, Image Segmentation, Image Enhancement, Region Growing, Connected Components, Parallel Performance
16Nicholas Yialelis, Emil Lupu, Morris Sloman Role-based security for distributed object systems. Search on Bibsonomy WETICE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF role based security, multi organisational enterprise, role framework, obligation policies, domain based authentication service, replicated servers, minimal state, access control, distributed processing, role based access control, security policies, authorisation, security architecture, distributed object systems, access rights, symmetric cryptography, security agents
16Samir A. Abd-Elmalak, Chintan Vaishnav, Anura P. Jayasumana Performance of a Robust WDM Network with Token-Based Reservations and a Limited Number of Lasers at a Station. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF token based reservations, symmetric robust WDM network, signaling channel, circuit switched connections, reservation interval, WDM transmissions, WDM star network, simulation results, wavelength division multiplexing, network performance, lasers, token passing, network parameters, model accuracy
16Gabriel Taubin Estimating the Tensor of Curvature of a Surface from a Polyhedral Approximation. Search on Bibsonomy ICCV The full citation details ... 1995 DBLP  DOI  BibTeX  RDF tensor of curvature, polyhedral approximation, principal curvature estimation, iso-surface construction algorithms, symmetric matrices, integral formulas, computer vision, computer vision, computational geometry, surface, eigenvalues, medical applications, tensors, eigenvectors, eigenvalues and eigenfunctions, polyhedral surface, matrix representation
16Thomas Koller, Guido Gerig, Gábor Székely, Daniel Dettwiler Multiscale Detection of Curvilinear Structures in 2D and 3D Image Data. Search on Bibsonomy ICCV The full citation details ... 1995 DBLP  DOI  BibTeX  RDF multiscale detection, curvilinear structures, 2D image data, 3D image data, parameter-free technique, line structure segmentation, local description, nonlinear combination, elongated symmetric line structures, edge response suppression, sharp maximum, line-feature profile, multi-scale response, local contrast, magnetic resonance volume data, cerebral blood vessels, parameter-free implementation, center-line position, computer vision, image segmentation, medical image processing, scale-space, filtering theory, brain, polarity, biomedical NMR, steerable filter, linear filters
16Andrew Zisserman, Joseph L. Mundy, David A. Forsyth, Jane Liu, Nic Pillow, Charlie Rothwell, Sven Utcke Class-Based Grouping in Perspective Images. Search on Bibsonomy ICCV The full citation details ... 1995 DBLP  DOI  BibTeX  RDF perspective images, class-based grouping, individual object, 3D geometric class, image outline, image constraints, feature grouping, 3D invariant descriptions, symmetry axes, canonical coordinate frames, projective signatures, real cluttered scenes, grouping algorithms, rotationally symmetric surfaces, canal surfaces, feature extraction, computational geometry, object recognition, image recognition, image features, polyhedra, perspective projection, feature identification, complex scene, object recognition system
16Y. M. Kadah, Ahmed H. Tewfik Theory of true-velocity duplex imaging using a single transducer. Search on Bibsonomy ICIP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Doppler measurement, ultrasonic scattering, ultrasonic transducers, flow measurement, velocity measurement, true velocity duplex imaging, B-mode/Doppler duplex imaging, true velocity vector, reflected signal, point scatterers, circularly symmetric apertures, illumination configuration, range invariant velocity estimation, generalized range 2D Doppler ambiguity function, Doppler ultrasound flowmeters, measurements, spectral analysis, power spectrum, Poisson distribution, Poisson distribution, ultrasonic imaging, range estimation
16N. Steffensen, Nikolaos G. Bourbakis A method for parallel skeletonization of images. Search on Bibsonomy ICIP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF parallel skeletonization, image skeletons, regions size independent images, noise nonsensitive images, shape variation, parallel symmetric thinning algorithm, PSTA2, PSTA1, parallel algorithms, edge detection, noise, binary images
16Zulkalnain Mohdyusof, Thomas R. Fischer Subband image coding using a fixed-rate lattice vector quantizer. Search on Bibsonomy ICIP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF subband image coding, fixed-rate lattice vector quantizer, entropy-coded lattice vector quantizer, error-free channel, variable length coder, single bit error, encoding rates, channel noise, performance, image coding, error analysis, image quality, error propagation, vector quantisation, entropy codes, lattice theory, degradation, macroblock, transmission error, binary symmetric channel
16Yibin Zheng, Peter C. Doerschuk Reconstruction of viruses from solution X-ray scattering data. Search on Bibsonomy ICIP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF X-ray scattering, biological techniques, viruses reconstruction, solution X-ray scattering data, 3-dimensional structure, icosahedrally-symmetric viruses, Gerchberg-Saxton algorithm generalization, unknown n-vector, norm squared, virus particles dynamics, cowpea mosaic virus, iterative methods, iterative algorithm, molecular configurations, molecular biophysics, model-based method
16Hiroshi Ito, Nariman Farvardin A wavelet video coder using entropy-constrained trellis coded quantization. Search on Bibsonomy ICIP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF wavelet video coder, entropy constrained trellis coded quantization, interframe prediction errors, subband data, switching mechanism, interframe coding, intraframe coding, symmetric codebooks, subband signals, generalized Gaussian source, output rate, feedback quantization control, fixed rate system, wavelet transforms, image sequences, image sequence, video coding, motion compensation, motion compensation, simulation results, video sequence, Gaussian processes, frequency domain, rate distortion theory, entropy codes, codec, prediction theory, video codecs, rate distortion performance, quantisation (signal), macroblock, trellis codes
16Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell Key distribution without individual trusted authentification servers. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF key distribution systems, authentication servers, key distribution protocols, cross checksum scheme, cryptography, trust, protocols, data integrity, message authentication, symmetric encryption
16Randall D. Peters Remote Respiratory Monitor. Search on Bibsonomy CBMS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF pneumodynamics, pressure transducers, biomedical telemetry, remote respiratory monitor, symmetric differential capacitive sensors, pressure transducer, electrical symmetry, sensitivity, physics, personal computer, medical computing, microcomputer applications, patient monitoring, computerised monitoring, pressure sensors, electric sensing devices
16Timothy J. McBrayer, Philip A. Wilsey Process combination to increase event granularity in parallel logic simulation. Search on Bibsonomy IPPS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF event granularity, VHDL description, parallel processing, logic CAD, circuit analysis computing, logic circuits, logic circuits, symmetric multiprocessors, logic simulation, digital system design, parallel logic simulation, parallel logic simulators
16Tsutomu Sasao, Jon T. Butler Planar Multiple-Valued Decision Diagrams. Search on Bibsonomy ISMVL The full citation details ... 1995 DBLP  DOI  BibTeX  RDF planar multiple-valued decision diagrams, monotone increasing functions, binary functions, field programmable gate arrays, programmable logic arrays, multivalued logic circuits, threshold logic, symmetric functions, threshold functions
16J. Beckman, T. C. Wesselkamper The Radii of Sheffer Functions Over E(3). Search on Bibsonomy ISMVL The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Sheffer functions radii, two place function, least natural number, isotopy classes, E(3), symmetric Sheffer function, functions, multivalued logic
16Linda Gardner, Zevi Miller, Dan Pritikin, Ivan Hal Sudborough Embedding hypercubes into pancake, cycle prefix and substring reversal networks. Search on Bibsonomy HICSS (2) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF hypercube embedding, graph diameter, pancake network, burnt pancake network, cycle prefix network, substring reversal network, low dilation embeddings, graph theory, generators, hypercube networks, Cayley graphs, group theory, star network, symmetric group
16Sabine R. Öhring, Falguni Sarkar, Sajal K. Das 0001, Dirk H. Hohndel Cayley graph connected cycles: A new class of fixed-degree interconnection networks. Search on Bibsonomy HICSS (2) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Cayley graph connected cycles, fixed-degree interconnection networks, vertex-symmetric networks, maximally fault tolerant networks, abelian generator-sets, graph theory, fault tolerant computing, multiprocessor interconnection networks, routing algorithms, hypercube networks, network routing, broadcasting algorithms, cube-connected cycles, average distance
16Goutam Debnath, Kathy Debnath, Roshan Fernando The Pentium processor-90/100, microarchitecture and low power circuit design. Search on Bibsonomy VLSI Design The full citation details ... 1995 DBLP  DOI  BibTeX  RDF BIMOS integrated circuits, Pentium processor-90/100, low power circuit design, BiNMOS process, power consumption reduction, symmetric dual processing feature, multithreaded operating systems, 0.6 micron, 3.3 V, computer architecture, microarchitecture, integrated circuit design, microprocessor chips, 100 MHz
16Bernhard Albert, Anura P. Jayasumana Performance analysis of FDDI LANs using numerical methods. Search on Bibsonomy LCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF FDDI LANs, Mathematica code, graphing capabilities, average access delay estimate, advanced token ring based networks, FFOL, FDDI follow on LAN, medium loaded networks, low loaded networks, symmetric multimedia environment, bimodal traffic, short data packets, video packets, estimated average access time, varied offered load, simulators, performance evaluation, performance analysis, graph theory, virtual machines, delays, local area networks, error analysis, numerical analysis, numerical methods, error rate, symbol manipulation, FDDI, network configuration, confidence measure, token networks
16Marcel Tichem, M. S. Cohen Subμm Registration of Fiducial Marks Using Machine Vision. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF optical microscopy, optical workshop techniques, optical fibres, semiconductor lasers, sub/spl mu/m registration, fiducial marks, circularly symmetric fiducial marks, distributed edge positions, second-derivative zero-crossing method, diffraction fringes, microscope optical axis, laser-fibre alignment tolerance, computer vision, machine vision, centroids
16P. Shanti Sastry, M. A. L. Thathachar 0001 Analysis of Stochastic Automata Algorithm for Relaxation Labeling. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF stochastic automata algorithm, parallel stochastic algorithm, symmetric compatibility functions, consistent labeling, parallel algorithms, image processing, relaxation labelling, stochastic automata
16Ian Mackie, Leopoldo Román, Samson Abramsky An internal language for autonomous categories. Search on Bibsonomy Appl. Categorical Struct. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF Symmetric monoidal closed (autonomous) categories, internal languages, natural numbers objects, linear logic, coherence
16H. A. Almohamad, Salih O. Duffuaa A Linear Programming Approach for the Weighted Graph Matching Problem. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF weighted graph matching, quadratic optimization, simplex-based algorithm, Hungarian method, symmetric polynomial transform, pattern recognition, computational complexity, computational complexity, linear programming, linear programming, polynomial time, eigendecomposition
16Ishfaq Ahmad, Arif Ghafoor Semi-Distributed Load Balancing For Massively Parallel Multicomputer Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF massively parallel multicomputer systems, semidistributed approach, fully distributed approaches, two-level hierarchical control, independent symmetric regions, distance transitive graphs, scheduling points, fully distributed strategy, scheduling, distributed systems, computational complexity, load balancing, parallel architectures, multiprocessor interconnection networks, parallel machines, multiprocessor system, NP-complete problem, simulation study, interconnection structure, interconnection structures, state information, Hadamard matrix, combinatorial structure
16Michael Unser, Akram Aldroubi, Murray Eden Recursive Regularization Filters: Design, Properties, and Applications. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF causal recursive filters, first-order difference operators, highpass stabilizing kernels, discrete regularization filters, R-filters, stable symmetric lowpass filters, adjustable scale factor, anticausal recursive filtering, second-order difference operators, two-dimensional signals, optimal Canny edge detector, separable second-order R-filter, pattern recognition, edge detection, filtering and prediction theory, least squares approximation, least squares approximations, low-pass filters, impulse response, z-transform, Z transforms, decomposition theorems
16G. R. Blakley Information Theory Without the Finiteness Assumption, II: Unfolding the DES. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF Caesar cipher, codomain, polyalphabet, ramp scheme, toroidal matrix, distributivity, composite, product, group, code, continuous, function, position, diffusion, associativity, discrete, message, relation, DES, ring, arithmetic, domain, matrix, galois field, substitution, symbol, commutativity, cryptosystem, replacement, field, vector space, universal algebra, threshold scheme, transposition, symmetric group, confusion, sum, cyclic group, alphabet
15Hoon Hong, Daniel Profili, J. Rafael Sendra Conditions for eigenvalue configurations of two real symmetric matrices: a symmetric function approach. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Luka Milicevic Approximately symmetric forms far from being exactly symmetric. Search on Bibsonomy Comb. Probab. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Manman Dong, Chunyan Wang 0020, Qingni Zhu, Haibin Chen The partially symmetric rank-1 approximation of fourth-order partially symmetric tensors. Search on Bibsonomy Optim. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 16017 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license