The SCEAS System
Navigation Menu

Search the dblp DataBase


Jia Yu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jia Yu, Jan Newmarch, Michael Geisler
    JINI/J2EE Bridge for Large-scale IP Phone Services. [Citation Graph (0, 0)][DBLP]
    APSEC, 2003, pp:302-309 [Conf]
  2. Yan Luo, Jia Yu, Jun Yang, Laxmi N. Bhuyan
    Low power network processor design using clock gating. [Citation Graph (0, 0)][DBLP]
    DAC, 2005, pp:712-715 [Conf]
  3. Jia Yu, Wei Wu, Xi Chen, Harry Hsieh, Jun Yang, Felice Balarin
    Assertion-Based Design Exploration of DVS in Network Processor Architectures. [Citation Graph (0, 0)][DBLP]
    DATE, 2005, pp:92-97 [Conf]
  4. Jia Yu, Rajkumar Buyya, Chen-Khong Tham
    Cost-Based Scheduling of Scientific Workflow Application on Utility Grids. [Citation Graph (0, 0)][DBLP]
    e-Science, 2005, pp:140-147 [Conf]
  5. Jia Yu, Rajkumar Buyya
    A Novel Architecture for Realizing Grid Workflow using Tuple Spaces. [Citation Graph (0, 0)][DBLP]
    GRID, 2004, pp:119-128 [Conf]
  6. Jia Yu, Jun Yang, Shaojie Chen, Yan Luo, Laxmi N. Bhuyan
    Enhancing Network Processor Simulation Speed with Statistical Input Sampling. [Citation Graph (0, 0)][DBLP]
    HiPEAC, 2005, pp:68-83 [Conf]
  7. Rupeng Li, Xianghua Du, Guowen Li, Jia Yu, Daxing Li
    Key-Insulated Group Signature Scheme with Selective Revocation. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1057-1063 [Conf]
  8. Guowen Li, Jia Yu, Rupeng Li, Daxing Li
    Two Threshold Multisignature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1041-1045 [Conf]
  9. Rupeng Li, Jia Yu, Guowen Li, Daxing Li
    A New Identity-Based Blind Signature Scheme with Batch Verifications. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1051-1056 [Conf]
  10. Jia Yu, Srikumar Venugopal, Rajkumar Buyya
    Grid Market Directory: A Web Services based Grid Service Publication Directory [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  11. Jia Yu, Rajkumar Buyya
    A Taxonomy of Workflow Management Systems for Grid Computing. [Citation Graph (0, 0)][DBLP]
    J. Grid Comput., 2005, v:3, n:3-4, pp:171-200 [Journal]
  12. Fanyu Kong, Zhun Cai, Jia Yu, Daxing Li
    Improved generalized Atkin algorithm for computing square roots in finite fields. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2006, v:98, n:1, pp:1-5 [Journal]
  13. Jun Yang, Jia Yu, Youtao Zhang
    A low energy cache design for multimedia applications exploiting set access locality. [Citation Graph (0, 0)][DBLP]
    Journal of Systems Architecture, 2005, v:51, n:10-11, pp:653-664 [Journal]
  14. Jia Yu, Rajkumar Buyya
    A taxonomy of scientific workflow systems for grid computing. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2005, v:34, n:3, pp:44-49 [Journal]
  15. Jia Yu, Rajkumar Buyya
    Scheduling scientific workflow applications with deadline and budget constraints using genetic algorithms. [Citation Graph (0, 0)][DBLP]
    Scientific Programming, 2006, v:14, n:3-4, pp:217-230 [Journal]
  16. Jia Yu, Srikumar Venugopal, Rajkumar Buyya
    A Market-Oriented Grid Directory Service for Publication and Discovery of Grid Service Providers and their Services. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2006, v:36, n:1, pp:17-31 [Journal]
  17. Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li
    Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:52-60 [Conf]
  18. Jia Yu, Fanyu Kong, Rong Hao
    Forward Secure Threshold Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:587-597 [Conf]
  19. Jin Wang, Jia Yu, Daxing Li, Xi Bai, Zhongtian Jia
    Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:847-857 [Conf]
  20. Jia Yu, Jingnan Yao, Laxmi N. Bhuyan, Jun Yang
    Program Mapping onto Network Processors by Recursive Bipartitioning and Refining. [Citation Graph (0, 0)][DBLP]
    DAC, 2007, pp:805-810 [Conf]
  21. Fanyu Kong, Jia Yu, Zhun Cai, Daxing Li
    New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    TAMC, 2007, pp:189-198 [Conf]
  22. Jin Wang, Xi Bai, Jia Yu, Daxing Li
    Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. [Citation Graph (0, 0)][DBLP]
    TAMC, 2007, pp:148-158 [Conf]
  23. Jia Yu, Rajkumar Buyya
    A Taxonomy of Workflow Management Systems for Grid Computing [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  24. Chee Shin Yeo, Marcos Dias de Assunção, Jia Yu, Anthony Sulistio, Srikumar Venugopal, Martin Placek, Rajkumar Buyya
    Utility Computing and Global Grids [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  25. Jia Yu, Wei Wu, Xi Chen, Harry Hsieh, Jun Yang, Felice Balarin
    Assertion-Based Design Exploration of DVS in Network Processor Architectures [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  26. Yan Luo, Jia Yu, Jun Yang, Laxmi N. Bhuyan
    Conserving network processor power consumption by exploiting traffic variability. [Citation Graph (0, 0)][DBLP]
    TACO, 2007, v:4, n:1, pp:- [Journal]

  27. Revisiting the Cache Effect on Multicore Multithreaded Network Processors. [Citation Graph (, )][DBLP]

  28. Multi-objective planning for workflow execution on Grids. [Citation Graph (, )][DBLP]

  29. How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. [Citation Graph (, )][DBLP]

  30. An Approach to Convert Any Threshold Signature into a Threshold Group Signature. [Citation Graph (, )][DBLP]

  31. Key-Insulated Group Signature Scheme with Verifier-Local Revocation. [Citation Graph (, )][DBLP]

  32. Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP]

  33. Publicly Verifiable Secret Sharing with Enrollment Ability. [Citation Graph (, )][DBLP]

  34. A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage. [Citation Graph (, )][DBLP]

  35. The Design of an Open Hybrid Recommendation System for Mobile Commerce. [Citation Graph (, )][DBLP]

  36. Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. [Citation Graph (, )][DBLP]

  37. Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. [Citation Graph (, )][DBLP]

  38. Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme. [Citation Graph (, )][DBLP]

  39. Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. [Citation Graph (, )][DBLP]

  40. A Hybrid Recommendation Architecture for Mobile Commerce System. [Citation Graph (, )][DBLP]

  41. Design and Implementation of a Mobile GIS for Field Data Collection. [Citation Graph (, )][DBLP]

  42. A Novel Method of DOA Estimation Based on Subarray Beamforming for Uniform Circular Arrays. [Citation Graph (, )][DBLP]

  43. A local construction of the Smith normal form of a matrix polynomial [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002