The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yuan Zhou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yuan Zhou, Guangsheng Li, Qirong Mao, Yongzhao Zhan, Yibin Hou
    Design and Simulation of Multicast Routing Protocol for Mobile Internet. [Citation Graph (0, 0)][DBLP]
    APWeb, 2004, pp:887-890 [Conf]
  2. Yuan Zhou, Zhenfu Cao, Rongxing Lu
    Constructing Secure Warrant-Based Proxy Signcryption Schemes. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:172-185 [Conf]
  3. Yuan Zhou, Quan-Lin Li, Song De Ma
    Visualization of Geostress Tensor along Oil Well Trajectory. [Citation Graph (0, 0)][DBLP]
    Computer Graphics International, 2001, pp:317-320 [Conf]
  4. Shanshan Duan, Zhenfu Cao, Yuan Zhou
    Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:445-450 [Conf]
  5. Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
    Constructing Secure Proxy Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:150-161 [Conf]
  6. Reza Abedi, Shuo-Heng Chung, Jeff Erickson, Yong Fan, Michael Garland, Damrong Guoy, Robert Haber, John M. Sullivan, Shripad Thite, Yuan Zhou
    Spacetime meshing with adaptive refinement and coarsening. [Citation Graph (0, 0)][DBLP]
    Symposium on Computational Geometry, 2004, pp:300-309 [Conf]
  7. Zhenchuan Chai, Zhenfu Cao, Yuan Zhou
    Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:148-154 [Conf]
  8. Zhenchuan Chai, Zhenfu Cao, Yuan Zhou
    Encryption Based on Reversible Second-Order Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:350-358 [Conf]
  9. Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
    An Efficient Proxy-Protected Signature Scheme Based on Factoring. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:332-341 [Conf]
  10. Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
    Identity Based Key Insulated Signature. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:226-234 [Conf]
  11. Yuan Zhou, Michael Garland, Robert Haber
    Pixel-Exact Rendering of Spacetime Finite Element Solutions. [Citation Graph (0, 0)][DBLP]
    IEEE Visualization, 2004, pp:425-432 [Conf]
  12. Yuan Zhou, Guang-Sheng Li, Yongzhao Zhan, Qirong Mao, Yibin Hou
    DRMR: Dynamic-Ring-Based Multicast Routing Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:6, pp:909-919 [Journal]
  13. Yuan Zhou
    From Smart Guesser to Smart Navigator: Changes in Collection Development for Research Libraries in a Networked Environment. [Citation Graph (0, 0)][DBLP]
    Library Trends, 1994, v:42, n:4, pp:- [Journal]
  14. Michael Garland, Yuan Zhou
    Quadric-based simplification in any dimension. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Graph., 2005, v:24, n:2, pp:209-239 [Journal]
  15. Yuan Zhou, Michael Garland
    Interactive Point-Based Rendering of Higher-Order Tetrahedral Data. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Vis. Comput. Graph., 2006, v:12, n:5, pp:1229-1236 [Journal]
  16. Yuan Zhou, James M. Noras, S. J. Shepherd
    Novel design of multiplier-less FFT processors. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2007, v:87, n:6, pp:1402-1407 [Journal]
  17. Feng Shi, Yong Liu, Tianzi Jiang, Yuan Zhou, Wanlin Zhu, Jiefeng Jiang, Haihong Liu, Zhening Liu
    Regional Homogeneity and Anatomical Parcellation for fMRI Image Classification: Application to Schizophrenia and Normal Controls. [Citation Graph (0, 0)][DBLP]
    MICCAI (2), 2007, pp:136-143 [Conf]
  18. Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng
    How to construct secure proxy cryptosystem. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:19, pp:4095-4108 [Journal]
  19. Zhenchuan Chai, Zhen-Fu Cao, Yuan Zhou
    Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:103-108 [Journal]

  20. Quantifying Information Leakage for Fully Probabilistic Systems. [Citation Graph (, )][DBLP]


  21. Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP]


  22. MarcoPolo: a community system for sharing and integrating travel information on maps. [Citation Graph (, )][DBLP]


  23. Research on Application of Fuzzy Neural Network in Combine Harvester. [Citation Graph (, )][DBLP]


  24. Application of Artificial Intelligence Technology in Asphalt Concrete Mixer Control System. [Citation Graph (, )][DBLP]


  25. Modeling Internet Applications with Event Graphs. [Citation Graph (, )][DBLP]


  26. Application of fuzzy five states control system base on phase plane in steer by wire system of loader. [Citation Graph (, )][DBLP]


  27. Supporting Database Applications as a Service. [Citation Graph (, )][DBLP]


  28. A Surface-Based Fractal Information Dimension Method for Cortical Complexity Analysis. [Citation Graph (, )][DBLP]


  29. Semi-supervised topic modeling for image annotation. [Citation Graph (, )][DBLP]


  30. Application of Embedded System in Construction Machinery. [Citation Graph (, )][DBLP]


  31. Tighter Bounds for Facility Games. [Citation Graph (, )][DBLP]


  32. An IEEE 802.11 Model for the Planning of Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  33. Analysis of alpha-domain noise and feature detection for cognitive radio systems. [Citation Graph (, )][DBLP]


  34. On the alpha-Sensitivity of Nash Equilibria in PageRank-Based Network Reputation Games. [Citation Graph (, )][DBLP]


  35. Research on Survivability of Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]


  36. An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. [Citation Graph (, )][DBLP]


  37. Simulation Analysis of Probabilistic Timing Covert Channels. [Citation Graph (, )][DBLP]


  38. Design of Eye Tracking System for Real Scene. [Citation Graph (, )][DBLP]


  39. Optimal lower bounds for locality sensitive hashing (except when q is tiny) [Citation Graph (, )][DBLP]


  40. Efficient public key encryption with smallest ciphertext expansion from factoring. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002