|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 334 occurrences of 252 keywords
|
|
|
Results
Found 3585 publication records. Showing 3585 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
135 | Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
104 | Yi-Ou Li, Wei Wang 0018, Tülay Adali, Vince D. Calhoun |
CCA for joint blind source separation of multiple datasets with application to group FMRI analysis. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Sriram Krishnan, Dennis Gannon |
XCAT3: A Framework for CCA Components as OGSA Services. |
HIPS |
2004 |
DBLP DOI BibTeX RDF |
Babel, XSOAP, GSX, Web Services, Grids, Components, OGSA, CCA, OGSI |
88 | Michael Backes 0001, Christian Cachin |
Public-Key Steganography with Active Attacks. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
88 | Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen |
Relaxing Chosen-Ciphertext Security. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
77 | Liang Sun 0001, Shuiwang Ji, Jieping Ye |
A least squares formulation for canonical correlation analysis. |
ICML |
2008 |
DBLP DOI BibTeX RDF |
|
75 | Dong-Kweon Hong, Myung-Joon Kim, Sharma Chakravarthy |
Incorporating load factor into the scheduling of soft real-time transactions for main memory databases. |
RTCSA |
1996 |
DBLP DOI BibTeX RDF |
soft real-time transactions, coarse-granule locking, CCA-ALF, EDF-CR-ALF, simulations, scheduling, real-time systems, real-time database systems, main memory databases, load factor, data access patterns |
70 | Madhusudhan Govindaraju, Michael R. Head, Kenneth Chiu |
XCAT-C++: Design and Performance of a Distributed CCA Framework. |
HiPC |
2005 |
DBLP DOI BibTeX RDF |
XCAT-C++, multi-protocol, performance, component, CCA |
66 | Allan Aasbjerg Nielsen |
Multiset canonical correlations analysis and multispectral, truly multitemporal remote sensing data. |
IEEE Trans. Image Process. |
2002 |
DBLP DOI BibTeX RDF |
|
65 | Fang (Cherry) Liu, Randall Bramley |
CCA-LISI: On Designing A CCA Parallel Sparse Linear Solver Interface. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Maciej Malawski, Marian Bubak, Françoise Baude, Denis Caromel, Ludovic Henrio, Matthieu Morel |
Interoperability of Grid component models: GCM and CCA case study. |
CoreGRID |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Yunhui He, Li Zhao 0003, Cairong Zou |
Face Recognition Based on PCA/KPCA Plus CCA. |
ICNC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
59 | Madhusudhan Govindaraju, Sriram Krishnan, Kenneth Chiu, Aleksander Slominski, Dennis Gannon, Randall Bramley |
Merging the CCA Component Model with the OGSI Framework. |
CCGRID |
2003 |
DBLP DOI BibTeX RDF |
Web Services, Workflow, Composition, Computational Grids, OGSA, Component Architectures, CCA, OGSI |
58 | Jun Shao, Zhenfu Cao |
CCA-Secure Proxy Re-encryption without Pairings. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance |
58 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability |
58 | Quan-Sen Sun, Mao-Long Yang, Pheng-Ann Heng, De-Sen Xia |
Improvements on CCA Model with Application to Face Recognition. |
Intelligent Information Processing |
2004 |
DBLP DOI BibTeX RDF |
canonical correlation analysis(CCA), partial least squares (PLS), multivariate linear regression(MLR), feature extraction, face recognition, feature fusion |
55 | Bogdan F. Romanescu, Daniel J. Sorin |
Core cannibalization architecture: improving lifetime chip performance for multicore processors in the presence of hard faults. |
PACT |
2008 |
DBLP DOI BibTeX RDF |
lifetime performance, fault tolerance, reliability, multicore |
55 | Bin Zhen, Huan-Bang Li, Shinsuke Hara, Ryuji Kohno |
Energy Based Carrier Sensing in Integrated Medical Environments. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Teresa Fernandez, Michael Grinnell, Eric Weakland |
Poof: no more viruses. |
SIGUCCS |
2007 |
DBLP DOI BibTeX RDF |
cisco clean access, network admission control, requirements selection, transition strategy, deployment, malware, audit, virus, microsoft windows, remediation, enforcement, infection |
55 | Ron Steinfeld, Joonsang Baek, Yuliang Zheng 0001 |
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
55 | Nong Ye, Xiangyang Li |
A Machine Learning Algorithm Based on Supervised Clustering and Classification. |
Active Media Technology |
2001 |
DBLP DOI BibTeX RDF |
|
54 | Marian Bubak, Kamil Górka, Tomasz Gubala, Maciej Malawski, Katarzyna Zajac 0001 |
Component-Based System for Grid Application Workflow Composition. |
PVM/MPI |
2003 |
DBLP DOI BibTeX RDF |
Grid computations, OGSA, CCA, workflow composition |
53 | Ramin Rajabioun, Esmaeil Atashpaz-Gargari, Caro Lucas |
Colonial Competitive Algorithm as a Tool for Nash Equilibrium Point Achievement. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
Colonial Competitive Algorithm (CCA), global Nash Equilibrium, evolutionary algorithms, game theory |
50 | Paul Gowland, David R. Lester |
A Survey of Exact Arithmetic Implementations. |
CCA |
2000 |
DBLP DOI BibTeX RDF |
|
49 | Wei Liu 0001, Danilo P. Mandic, Andrzej Cichocki |
Analysis and Online Realization of the CCA Approach for Blind Source Separation. |
IEEE Trans. Neural Networks |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Yael Gertner, Tal Malkin, Steven A. Myers |
Towards a Separation of Semantic and CCA Security for Public Key Encryption. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Wei Liu 0001, Danilo P. Mandic, Andrzej Cichocki |
An analysis of the CCA approach for blind source separation and its adaptive realization. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
RSA assumptions, public key encryption, chosen-ciphertext security |
49 | Fang Liu |
ACM student research competition reception - CCA-LISI: on designing a common component architecture parallel sparse linear solver interface. |
SC |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Maciej Malawski, Dawid Kurzyniec, Vaidy S. Sunderam |
MOCCA - Towards a Distributed CCA Framework for Metacomputing. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Keming Zhang, Kostadin Damevski, Venkatanand Venkatachalapathy, Steven G. Parker |
SCIRun2: A CCA Framework for High Performance Computing. |
HIPS |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Felipe Bertrand, Randall Bramley |
DCA: A Distributed CCA Framework Based on MPI. |
HIPS |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
47 | Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen |
Adaptive-CCA on OpenPGP Revisited. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Chosen ciphertext attack (CCA), Encryption mode, Message format, E-mail, PGP, OpenPGP |
44 | Andrej Bauer, Peter Hertling, Ker-I Ko |
CCA 2009 Preface - Proceedings of the Sixth International Conference on Computability and Complexity in Analysis. |
CCA |
2009 |
DBLP BibTeX RDF |
|
44 | Andrej Bauer, Peter Hertling, Ker-I Ko |
CCA 2009 Front Matter - Proceedings of the Sixth International Conference on Computability and Complexity in Analysis. |
CCA |
2009 |
DBLP BibTeX RDF |
|
44 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa |
Tag-KEM/DEM: A New Framework for Hybrid Encryption. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption |
44 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Chosen Ciphertext Security with Optimal Ciphertext Overhead. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Xiaofeng Yu, Yan Zhang 0007, Tian Zhang 0001, Linzhang Wang, Jun Hu, Jianhua Zhao, Xuandong Li |
A model-driven development framework for enterprise Web services. |
Inf. Syst. Frontiers |
2007 |
DBLP DOI BibTeX RDF |
EDOC, Web services, Model-driven development |
44 | Véronique Cortier, Gavin Keighren, Graham Steel |
Automatic Analysis of the Security of XOR-Based Key Management Schemes. |
TACAS |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Humberto Mossri de Almeida, Marcos André Gonçalves, Marco Cristo, Pável Calado |
A combined component approach for finding collection-adapted ranking functions based on genetic programming. |
SIGIR |
2007 |
DBLP DOI BibTeX RDF |
machine learning, information retrieval, genetic programming, term-weighting, ranking functions |
44 | Li Li 0009, Thomas Kunz |
Localization applying an efficient neural network mapping. |
Autonomics |
2007 |
DBLP DOI BibTeX RDF |
curvilinear component analysis, simulations, localization, nonlinear mapping |
44 | Cairong Zou, Ning Sun 0001, Zhen-hai Ji, Li Zhao 0003 |
2DCCA: A Novel Method for Small Sample Size Face Recognition. |
WACV |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Jianxue Wang, Weichao Wang, Xifan Wang, Haoyong Chen, Xiuli Wang |
Cooperative Co-evolutionary Approach Applied in Reactive Power Optimization of Power System. |
ICNC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Steven Van Vaerenbergh, Javier Vía, Ignacio Santamaría |
Online Kernel Canonical Correlation Analysis for Supervised Equalization of Wiener Systems. |
IJCNN |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Petra Povalej, Peter Kokol, Tatjana Welzer-Druzovec, Bruno Stiglic |
Machine-Learning with Cellular Automata. |
IDA |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Mohammed A. Hasan |
Unconstrained functional criteria for canonical correlation analysis. |
ISCAS (3) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Ran Canetti, Shai Halevi, Jonathan Katz |
Chosen-Ciphertext Security from Identity-Based Encryption. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Pierre-Alain Fouque, David Pointcheval |
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Chosen-Ciphertext Attacks, Threshold Cryptosystems |
43 | Chen-Wo Kuo, Jiann-Min Yang, Quo-Ping Lin, Maiga Chang |
E-Learning: The Strategies of Learning Culture and Arts. |
Edutainment |
2009 |
DBLP DOI BibTeX RDF |
NPM, e-learning, culture, arts, CCA |
43 | Marian Bubak, Kamil Górka, Tomasz Gubala, Maciej Malawski, Katarzyna Zajac 0001 |
Automatic Flow Building for Component Grid Applications. |
PPAM |
2003 |
DBLP DOI BibTeX RDF |
Grid computations, OGSA, CCA, workflow composition |
42 | Richard A. Kemmerer, Tad Taylor |
A Modular Covert Channel Analysis Methodology for Trusted DG/UXTM. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
modular covert channel analysis methodology, Trusted DG/UX, CCA approach, subsystem architecture, DG/UX kernel, system state, abstract object, Ratings Maintenance Program, RAMP, SRM analysis, exported function, peer subsystems, kernel-wide SRM, commercial strength Unix system, operating system kernels, system calls, modular approach |
38 | Weilong Yang, Dong Yi, Zhen Lei 0001, Jitao Sang, Stan Z. Li |
2D-3D face matching using CCA. |
FG |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Dan Boneh, Jonathan Katz |
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Public-key encryption, Identity-based encryption, Chosen-ciphertext security |
38 | Benjamin A. Allan, Sophia Lefantzi, Jaideep Ray |
ODEPACK++: Refactoring the LSODE Fortran Library for Use in the CCA High Performance Component Software Architecture. |
HIPS |
2004 |
DBLP DOI BibTeX RDF |
parallel programming, object oriented, C++, FORTRAN, interface design, differential equations, software decomposition, common component architecture |
38 | M. Shahjahan, Kazuyuki Murase |
A Neural Learning Rule for CCA Approximation. |
ICONIP |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Xiaoqi Jia, Jun Shao 0001, Jiwu Jing, Peng Liu 0005 |
CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Type-based proxy re-encryption, CCA security, invisible proxy |
33 | Jianchun Zhang, Daoqiang Zhang |
Canonical random correlation analysis. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
dimensionality reduction, discriminant, multi-view, canonical correlation analysis |
33 | Ashwin Natarajan, Ying Cai, Johnny Wong |
An enhanced client-centric approach for efficient video broadcast. |
Multim. Tools Appl. |
2009 |
DBLP DOI BibTeX RDF |
Video on demand, Multimedia communication, Periodic broadcast, Service latency |
33 | Li Li 0009, Thomas Kunz |
Cooperative node localization using nonlinear data projection. |
ACM Trans. Sens. Networks |
2009 |
DBLP DOI BibTeX RDF |
curvilinear component analysis, simulations, Localization, multi-dimensional scaling, nonlinear mapping |
33 | Seiko Arita, Koji Tsurudome |
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption |
33 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
33 | María del Rocío Gómez Díaz, Rodrigo Sandoval-Almazán |
Gestión del conocimiento estrategia de vinculación en los centros comunitarios de aprendizaje. |
D.GO |
2009 |
DBLP BibTeX RDF |
centros comunitarios de aprendizaje, conocimiento explícito, conocimiento tácito, gestión del conocimiento |
33 | Tingkai Sun, Songcan Chen, Jing-Yu Yang, Pengfei Shi |
A Novel Method of Combined Feature Extraction for Recognition. |
ICDM |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Leong Hou U, Man Lung Yiu, Kyriakos Mouratidis, Nikos Mamoulis |
Capacity constrained assignment in spatial databases. |
SIGMOD Conference |
2008 |
DBLP DOI BibTeX RDF |
optimal assignment, spatial databases |
33 | Goichiro Hanaoka, Kaoru Kurosawa |
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Timothée Bailloeul, Cai-Zhi Zhu, Yinghui Xu |
Automatic image tagging as a random walk with priors on the canonical correlation subspace. |
Multimedia Information Retrieval |
2008 |
DBLP DOI BibTeX RDF |
image retrieval, image annotation, local binary pattern, inverse document frequency |
33 | Tarik Taleb, Keisuke Ooi, Kazuo Hashimoto |
An Efficient Collision Avoidance Strategy for ITS systems. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Hsiang-Fu Yu, Hung-Chang Yang, Chu-Yi Chien, Yao-Tien Wang |
A Limited-Client-Capability Broadcasting Scheme for VoD Applications. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
buffer, Periodic broadcasting, video-on-demand (VOD), cable TV |
33 | Sihan Qing, Changxiang Shen |
Design of secure operating systems with high security levels. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
secure operating systems with high security levels, covert channel analysis, architecture, security model |
33 | Mehmet Emre Sargin, Yücel Yemez, Engin Erzin, A. Murat Tekalp |
Audiovisual Synchronization and Fusion Using Canonical Correlation Analysis. |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Chong Wang 0002 |
Variational Bayesian Approach to Canonical Correlation Analysis. |
IEEE Trans. Neural Networks |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Jian Ma, Zengqi Sun |
Copula Component Analysis. |
ICA |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Tae-Kyun Kim, Shu-Fai Wong, Roberto Cipolla |
Tensor Canonical Correlation Analysis for Action Classification. |
CVPR |
2007 |
DBLP DOI BibTeX RDF |
|
33 | José Alonso Ybáñez Zepeda, Franck Davoine, Maurice Charbit |
A linear estimation method for 3D pose and facial animation tracking. |
CVPR |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Sham M. Kakade, Dean P. Foster |
Multi-view Regression Via Canonical Correlation Analysis. |
COLT |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Bryan D. Thompson, Mahmood R. Azimi-Sadjadi |
An Iterative Learning Algorithm for Multi-Channel Coherence Analysis. |
IJCNN |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Mustafa Karakoç, Adnan Kavak |
Stochastic Optimization Algorithm Based Dynamic Resource Assignment for 3G Systems. |
NEW2AN |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Joakim Rydell, Hans Knutsson, Magnus Borga |
Rotational Invariance in Adaptive fMRI Data Analysis. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Kenji Yoshihira |
Combining supervised and unsupervised monitoring for fault detection in distributed computing systems. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
supervised monitoring, distributed computing, fault detection, internet services, canonical correlation analysis |
33 | Michael Reiter, Rene Donner, Georg Langs, Horst Bischof |
3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis. |
ICPR (1) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Ryotaro Hayashi 0001, Keisuke Tanaka |
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Yen-Jen Chang |
An Alternative Real-Time Filter Scheme to Block Buffering. |
VLSI Design |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Nicholas Hopper |
On Steganographic Chosen Covertext Security. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Petra Povalej, Mitja Lenic, Peter Kokol |
Improving Ensembles with Classificational Cellular Automata. |
IDEAL |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Amir R. Razavi, Hans Gill, Hans Åhlfeldt, Nosrat Shahsavar |
A Data Pre-processing Method to Increase Efficiency and Accuracy in Data Mining. |
AIME |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Boyana Norris |
Software Architecture Issues in Scientific Component Development. |
PARA |
2004 |
DBLP DOI BibTeX RDF |
|
33 | David E. Bernholdt |
High-Performance Parallel and Distributed Scientific Computing with the Common Component Architecture. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Kaoru Kurosawa, Yvo Desmedt |
A New Paradigm of Hybrid Encryption Scheme. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
KEM, standard model, hybrid encryption |
33 | Hong-Yi Huang, Shih-Lun Chen |
Threshold triggers and accelerator for deep submicron interconnection. |
APCCAS (2) |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Pei Ling Lai, Colin Fyfe |
Kernel and Nonlinear Canonical Correlation Analysis. |
IJCNN (4) |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Da-Chuan Cheng, Kuo-Sheng Cheng, Arno Schmidt-Trucksäss, Markus Sandrock, Qin Pu, Hans Burkhardt |
Automatic Detection of the Intimal and the Adventitial Layers of the Common Carotid Artery Wall in Ultrasound B-Mode Images Using Snakes. |
ICIAP |
1999 |
DBLP DOI BibTeX RDF |
|
32 | Shanshan Li, Qun Wang |
DHPA: A New Distributed High Performance Architecture for Space Environment Modeling and Simulation. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Space environment, Simulation, High Performance Computing, CCA, Modeling Framework |
32 | Sanja Fidler, Danijel Skocaj, Ales Leonardis |
Combining Reconstructive and Discriminative Subspace Methods for Robust Classification and Regression by Subsampling. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2006 |
DBLP DOI BibTeX RDF |
reconstructive methods, discriminative methods, robust classification, high-breakdown point classification, PCA, occlusion, outlier detection, LDA, Subspace methods, CCA, subsampling, robust regression |
32 | Dennis Gannon, Sriram Krishnan, Liang Fang, Gopi Kandaswamy, Yogesh Simmhan, Aleksander Slominski |
On Building Parallel & Grid Applications: Component Technology and Distributed Services. |
Clust. Comput. |
2005 |
DBLP DOI BibTeX RDF |
grid web services, XCAT, component framework, CCA |
32 | Yoshio Takane, Michael A. Hunter |
Constrained Principal Component Analysis: A Comprehensive Theory. |
Appl. Algebra Eng. Commun. Comput. |
2001 |
DBLP DOI BibTeX RDF |
GSVD (generalized singular value decomposition), CALC, GMANOVA, Lagrange's theorem, CANO, CA (correspondence analysis), Projection, CCA |
32 | Jiangxia Ge, Tianshu Shan, Rui Xue 0001 |
On the Fujisaki-Okamoto transform: from Classical CCA Security to Quantum CCA Security. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
32 | James Chapman 0006, Hao-Ting Wang |
CCA-Zoo: A collection of Regularized, Deep Learning based, Kernel, and Probabilistic CCA methods in a scikit-learn style framework. |
J. Open Source Softw. |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Daniel Jost 0001, Christian Badertscher, Fabio Banfi |
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
32 | Hossam M. Farag, Aamir Mahmood, Mikael Gidlund, Patrik Österberg |
PR-CCA MAC: A Prioritized Random CCA MAC Protocol for Mission-Critical IoT Applications. |
ICC |
2018 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 3585 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|