|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 20 occurrences of 18 keywords
|
|
|
Results
Found 48 publication records. Showing 48 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
42 | Jinhua Du, Andy Way |
A Three-Pass System Combination Framework by Combining Multiple Hypothesis Alignment Methods. |
IALP |
2009 |
DBLP DOI BibTeX RDF |
three-pass, system combination, hypothesis alignment, super network |
37 | Sam F. Mendicino, Robert A. Hughes, Jeanne T. Martin, Frank H. McMahon, John E. Ranelletti, Richard G. Zwakenberg |
The LRLTRAN compiler. |
Commun. ACM |
1968 |
DBLP DOI BibTeX RDF |
Polish processor, common subsegments, machine independence, scatter storage technique, optimization, compiler, compiler-compiler, tree representations |
37 | Charles B. Owen, Fillia Makedon |
Bottleneck-Free Separable Affine Image Warping. |
ICIP (1) |
1997 |
DBLP DOI BibTeX RDF |
|
37 | Thierry Blu, Michael Unser |
Quantitative L2 Error Analysis for Interpolation Methods and Wavelt Expansions. |
ICIP (1) |
1997 |
DBLP DOI BibTeX RDF |
|
28 | Boyeon Song, Kwangjo Kim |
Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Ning-ning Qu, Guang Zhu, Xi-an Zhao, Chang-feng Jing, Jing-guo Lv |
The analysis of surface deformation based on two-pass and three-pass D-InSAR. |
IGARSS |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Joon-Sung Yang, Nur A. Touba |
Expanding Trace Buffer Observation Window for In-System Silicon Debug through Selective Capture. |
VTS |
2008 |
DBLP DOI BibTeX RDF |
Trace Buffer Observation Window, Two-Dimensional (2-D) Compaction, Cycling Register, Silicon Debug, MISR |
22 | Paul S. Heckbert |
Adaptive radiosity textures for bidirectional ray tracing. |
SIGGRAPH |
1990 |
DBLP DOI BibTeX RDF |
|
21 | Daniela Siano |
Three-dimensional/one-dimensional numerical correlation study of a three-pass perforated tube. |
Simul. Model. Pract. Theory |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Jen-Shiun Chiang, Ting-Hao Hwang, Tsung-Ta Lin, Chih-Hsien Hsia |
High efficiency architecture of escot with pass concurrent context modeling scheme for scalable video coding. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | C. William Gear |
High speed compilation of efficient object code. |
Commun. ACM |
1965 |
DBLP DOI BibTeX RDF |
|
16 | François Dupont |
A new Shamir's three pass random matrix ciphering mechanism. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Emil Faure, Anatoly Shcherba, Artem Lavdanskyi, Mykola Makhynko, Muhabbat Khizirova |
Three-Pass Protocol on Permutations: Implementation Example and Security. |
CPITS |
2024 |
DBLP BibTeX RDF |
|
16 | Bagus Santoso, Yasuhiko Ikematsu, Shuhei Nakamura, Takanori Yasuda |
Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Bagus Santoso, Taiyo Yamaguchi |
A New Three-Pass Code-based Zero-Knowledge Identification Scheme with Cheating Probability of Exactly Half. |
ISITA |
2018 |
DBLP DOI BibTeX RDF |
|
16 | Mohammed Issam Younis, Mustafa Hashim Abdulkareem |
ITPMAP: An Improved Three-Pass Mutual Authentication Protocol for Secure RFID Systems. |
Wirel. Pers. Commun. |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Cansu Betin Onur, Adnan Kiliç, Ertan Onur |
Impossibility of Three Pass Protocol using Public Abelian Groups. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
16 | Amin Subandi, Rini Meiyanti, Cut Lika Mestika Sandy, Rahmat Widia Sembiring |
Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
16 | S. Nithya, K. Meena alias Jeyanthi |
Genetic algorithm based bacterial foraging optimization with three-pass protocol concept for heterogeneous network security enhancement. |
J. Comput. Sci. |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Hajer Boujezza, Hella Kaffel-Ben Ayed, Leïla Azouz Saïdane |
Protection of IoT transaction using ID-KEM based on three-pass protocol countermeasure. |
IWCMC |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Sourav Mandal 0003, Somnath Pal |
A Three-Pass Algorithm for Generation of BE-Matrices from IUPAC Names. |
Int. J. Chemoinformatics Chem. Eng. |
2013 |
DBLP DOI BibTeX RDF |
|
16 | Anselme Tueno |
Zwei Anwendungen des Paillier-Kryptosystems: Blinde Signatur und Three-Pass-Protocol |
CoRR |
2012 |
DBLP BibTeX RDF |
|
16 | Jarred Barber, Stephen Kogon |
Probabilistic three-pass SAR Coherent Change Detection. |
ACSCC |
2012 |
DBLP DOI BibTeX RDF |
|
16 | Yoshito Kanamori, Seong-Moo Yoo |
Quantum Three-Pass protocol: Key distribution using quantum superposition states |
CoRR |
2010 |
DBLP BibTeX RDF |
|
16 | Jinhua Du, Andy Way |
An Incremental Three-pass System Combination Framework by Combining Multiple Hypothesis Alignment Methods. |
Int. J. Asian Lang. Process. |
2010 |
DBLP BibTeX RDF |
|
16 | Jinhua Du, Pavel Pecina, Andy Way |
An Augmented Three-Pass System Combination Framework: DCU Combination System for WMT 2010. |
WMT@ACL |
2010 |
DBLP BibTeX RDF |
|
16 | Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu |
Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
16 | Meng-Hui Lim, Chee-Min Yeoh, Sanggon Lee, Hyotaek Lim, Hoonjae Lee 0001 |
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Andre Gustavo Degraf Uchoa, Marcelo Eduardo Pellenz, Altair Olivo Santin, Carlos Alberto Maziero |
A Three-Pass Protocol for Cryptography Based on Padding for Wireless Networks. |
CCNC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Sung-Min Lee 0006, Tai-Yun Kim |
Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature. |
SAFECOMP |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Pat Hanrahan |
Three-pass affine transforms for volume rendering. |
VVS |
1990 |
DBLP DOI BibTeX RDF |
|
16 | Marc Girault |
A (non-practical) three-pass identification protocol using coding theory. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
11 | Wai-Shun Tong, Chi-Keung Tang |
Robust Estimation of Adaptive Tensors of Curvature by Tensor Voting. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Ulf Assarsson, Tomas Akenine-Möller |
Occlusion culling and z-fail for soft shadow volume algorithms. |
Vis. Comput. |
2004 |
DBLP DOI BibTeX RDF |
Graphics hardware, Soft shadows, Shadow volumes |
9 | Yijun Li, Magdy A. Bayoumi |
A Three-Level Parallel High-Speed Low-Power Architecture for EBCOT of JPEG 2000. |
IEEE Trans. Circuits Syst. Video Technol. |
2006 |
DBLP DOI BibTeX RDF |
|
6 | Dan J. Kadrmas |
Rotate-and-Slant Projector for Fast LOR-Based Fully-3-D Iterative PET Reconstruction. |
IEEE Trans. Medical Imaging |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Vladimir Shpilrain, Alexander Ushakov |
An Authentication Scheme Based on the Twisted Conjugacy Problem. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Karl Meier, Alessandro Forin |
Hardware Compilation from Machine Code with M2V. |
FCCM |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Srinivasan Keshav |
How to read a paper. |
Comput. Commun. Rev. |
2007 |
DBLP DOI BibTeX RDF |
reading, paper, hints |
6 | Yoshito Kanamori, Seong-Moo Yoo, Mohammad Al-Shurman |
A quantum no-key protocol for secure data communication. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
|
6 | Gwo-Ching Chang |
A Feasible Security Mechanism for Low Cost RFID Tags. |
ICMB |
2005 |
DBLP DOI BibTeX RDF |
|
6 | Taekyoung Kwon 0002 |
Practical Authenticated Key Agreement Using Passwords. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
6 | Paul Smith, Tom Drummond, Kimon Roussopoulos |
Computing MAP trajectories by representing, propagating and combining PDFs over groups. |
ICCV |
2003 |
DBLP DOI BibTeX RDF |
|
6 | Nathan A. Carr, Jesse D. Hall, John C. Hart |
GPU algorithms for radiosity and subsurface scattering. |
Graphics Hardware |
2003 |
DBLP DOI BibTeX RDF |
|
6 | Michael Unser, Philippe Thévenaz, Leonid P. Yaroslavsky |
Convolution-based interpolation for fast, high-quality rotation of images. |
IEEE Trans. Image Process. |
1995 |
DBLP DOI BibTeX RDF |
|
6 | Uwe F. Pleban, Peter Lee 0001 |
An Automatically Generated, Realistic Compiler for an Imperative Programming Language. |
PLDI |
1988 |
DBLP DOI BibTeX RDF |
C |
6 | Yvo Desmedt, Andrew M. Odlyzko |
A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
6 | Vincent A. Busam, Donald E. Englund |
Optimization of expressions in Fortran. |
Commun. ACM |
1969 |
DBLP DOI BibTeX RDF |
DO loops, invariant calculations, optimization, compilation, compilers, FORTRAN, FORTRAN, register allocation, expressions, common subexpressions, subscripts |
Displaying result #1 - #48 of 48 (100 per page; Change: )
|
|