Search the dblp DataBase
Jia Yu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jia Yu , Jan Newmarch , Michael Geisler JINI/J2EE Bridge for Large-scale IP Phone Services. [Citation Graph (0, 0)][DBLP ] APSEC, 2003, pp:302-309 [Conf ] Yan Luo , Jia Yu , Jun Yang , Laxmi N. Bhuyan Low power network processor design using clock gating. [Citation Graph (0, 0)][DBLP ] DAC, 2005, pp:712-715 [Conf ] Jia Yu , Wei Wu , Xi Chen , Harry Hsieh , Jun Yang , Felice Balarin Assertion-Based Design Exploration of DVS in Network Processor Architectures. [Citation Graph (0, 0)][DBLP ] DATE, 2005, pp:92-97 [Conf ] Jia Yu , Rajkumar Buyya , Chen-Khong Tham Cost-Based Scheduling of Scientific Workflow Application on Utility Grids. [Citation Graph (0, 0)][DBLP ] e-Science, 2005, pp:140-147 [Conf ] Jia Yu , Rajkumar Buyya A Novel Architecture for Realizing Grid Workflow using Tuple Spaces. [Citation Graph (0, 0)][DBLP ] GRID, 2004, pp:119-128 [Conf ] Jia Yu , Jun Yang , Shaojie Chen , Yan Luo , Laxmi N. Bhuyan Enhancing Network Processor Simulation Speed with Statistical Input Sampling. [Citation Graph (0, 0)][DBLP ] HiPEAC, 2005, pp:68-83 [Conf ] Rupeng Li , Xianghua Du , Guowen Li , Jia Yu , Daxing Li Key-Insulated Group Signature Scheme with Selective Revocation. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:1057-1063 [Conf ] Guowen Li , Jia Yu , Rupeng Li , Daxing Li Two Threshold Multisignature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:1041-1045 [Conf ] Rupeng Li , Jia Yu , Guowen Li , Daxing Li A New Identity-Based Blind Signature Scheme with Batch Verifications. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:1051-1056 [Conf ] Jia Yu , Srikumar Venugopal , Rajkumar Buyya Grid Market Directory: A Web Services based Grid Service Publication Directory [Citation Graph (0, 0)][DBLP ] CoRR, 2003, v:0, n:, pp:- [Journal ] Jia Yu , Rajkumar Buyya A Taxonomy of Workflow Management Systems for Grid Computing. [Citation Graph (0, 0)][DBLP ] J. Grid Comput., 2005, v:3, n:3-4, pp:171-200 [Journal ] Fanyu Kong , Zhun Cai , Jia Yu , Daxing Li Improved generalized Atkin algorithm for computing square roots in finite fields. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2006, v:98, n:1, pp:1-5 [Journal ] Jun Yang , Jia Yu , Youtao Zhang A low energy cache design for multimedia applications exploiting set access locality. [Citation Graph (0, 0)][DBLP ] Journal of Systems Architecture, 2005, v:51, n:10-11, pp:653-664 [Journal ] Jia Yu , Rajkumar Buyya A taxonomy of scientific workflow systems for grid computing. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2005, v:34, n:3, pp:44-49 [Journal ] Jia Yu , Rajkumar Buyya Scheduling scientific workflow applications with deadline and budget constraints using genetic algorithms. [Citation Graph (0, 0)][DBLP ] Scientific Programming, 2006, v:14, n:3-4, pp:217-230 [Journal ] Jia Yu , Srikumar Venugopal , Rajkumar Buyya A Market-Oriented Grid Directory Service for Publication and Discovery of Grid Service Providers and their Services. [Citation Graph (0, 0)][DBLP ] The Journal of Supercomputing, 2006, v:36, n:1, pp:17-31 [Journal ] Fanyu Kong , Jia Yu , Baodong Qin , Daxing Li Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:52-60 [Conf ] Jia Yu , Fanyu Kong , Rong Hao Forward Secure Threshold Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:587-597 [Conf ] Jin Wang , Jia Yu , Daxing Li , Xi Bai , Zhongtian Jia Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:847-857 [Conf ] Jia Yu , Jingnan Yao , Laxmi N. Bhuyan , Jun Yang Program Mapping onto Network Processors by Recursive Bipartitioning and Refining. [Citation Graph (0, 0)][DBLP ] DAC, 2007, pp:805-810 [Conf ] Fanyu Kong , Jia Yu , Zhun Cai , Daxing Li New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] TAMC, 2007, pp:189-198 [Conf ] Jin Wang , Xi Bai , Jia Yu , Daxing Li Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. [Citation Graph (0, 0)][DBLP ] TAMC, 2007, pp:148-158 [Conf ] Jia Yu , Rajkumar Buyya A Taxonomy of Workflow Management Systems for Grid Computing [Citation Graph (0, 0)][DBLP ] CoRR, 2005, v:0, n:, pp:- [Journal ] Chee Shin Yeo , Marcos Dias de Assunção , Jia Yu , Anthony Sulistio , Srikumar Venugopal , Martin Placek , Rajkumar Buyya Utility Computing and Global Grids [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Jia Yu , Wei Wu , Xi Chen , Harry Hsieh , Jun Yang , Felice Balarin Assertion-Based Design Exploration of DVS in Network Processor Architectures [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Yan Luo , Jia Yu , Jun Yang , Laxmi N. Bhuyan Conserving network processor power consumption by exploiting traffic variability. [Citation Graph (0, 0)][DBLP ] TACO, 2007, v:4, n:1, pp:- [Journal ] Revisiting the Cache Effect on Multicore Multithreaded Network Processors. [Citation Graph (, )][DBLP ] Multi-objective planning for workflow execution on Grids. [Citation Graph (, )][DBLP ] How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. [Citation Graph (, )][DBLP ] An Approach to Convert Any Threshold Signature into a Threshold Group Signature. [Citation Graph (, )][DBLP ] Key-Insulated Group Signature Scheme with Verifier-Local Revocation. [Citation Graph (, )][DBLP ] Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP ] Publicly Verifiable Secret Sharing with Enrollment Ability. [Citation Graph (, )][DBLP ] A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage. [Citation Graph (, )][DBLP ] The Design of an Open Hybrid Recommendation System for Mobile Commerce. [Citation Graph (, )][DBLP ] Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. [Citation Graph (, )][DBLP ] Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. [Citation Graph (, )][DBLP ] Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme. [Citation Graph (, )][DBLP ] Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. [Citation Graph (, )][DBLP ] A Hybrid Recommendation Architecture for Mobile Commerce System. [Citation Graph (, )][DBLP ] Design and Implementation of a Mobile GIS for Field Data Collection. [Citation Graph (, )][DBLP ] A Novel Method of DOA Estimation Based on Subarray Beamforming for Uniform Circular Arrays. [Citation Graph (, )][DBLP ] A local construction of the Smith normal form of a matrix polynomial [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.301secs