The SCEAS System
| |||||||

## Search the dblp DataBase
Yuan Zhou:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Yuan Zhou, Guangsheng Li, Qirong Mao, Yongzhao Zhan, Yibin Hou
**Design and Simulation of Multicast Routing Protocol for Mobile Internet.**[Citation Graph (0, 0)][DBLP] APWeb, 2004, pp:887-890 [Conf] - Yuan Zhou, Zhenfu Cao, Rongxing Lu
**Constructing Secure Warrant-Based Proxy Signcryption Schemes.**[Citation Graph (0, 0)][DBLP] CANS, 2005, pp:172-185 [Conf] - Yuan Zhou, Quan-Lin Li, Song De Ma
**Visualization of Geostress Tensor along Oil Well Trajectory.**[Citation Graph (0, 0)][DBLP] Computer Graphics International, 2001, pp:317-320 [Conf] - Shanshan Duan, Zhenfu Cao, Yuan Zhou
**Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme.**[Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:445-450 [Conf] - Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
**Constructing Secure Proxy Cryptosystem.**[Citation Graph (0, 0)][DBLP] CISC, 2005, pp:150-161 [Conf] - Reza Abedi, Shuo-Heng Chung, Jeff Erickson, Yong Fan, Michael Garland, Damrong Guoy, Robert Haber, John M. Sullivan, Shripad Thite, Yuan Zhou
**Spacetime meshing with adaptive refinement and coarsening.**[Citation Graph (0, 0)][DBLP] Symposium on Computational Geometry, 2004, pp:300-309 [Conf] - Zhenchuan Chai, Zhenfu Cao, Yuan Zhou
**Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network.**[Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:148-154 [Conf] - Zhenchuan Chai, Zhenfu Cao, Yuan Zhou
**Encryption Based on Reversible Second-Order Cellular Automata.**[Citation Graph (0, 0)][DBLP] ISPA Workshops, 2005, pp:350-358 [Conf] - Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
**An Efficient Proxy-Protected Signature Scheme Based on Factoring.**[Citation Graph (0, 0)][DBLP] ISPA Workshops, 2005, pp:332-341 [Conf] - Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
**Identity Based Key Insulated Signature.**[Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:226-234 [Conf] - Yuan Zhou, Michael Garland, Robert Haber
**Pixel-Exact Rendering of Spacetime Finite Element Solutions.**[Citation Graph (0, 0)][DBLP] IEEE Visualization, 2004, pp:425-432 [Conf] - Yuan Zhou, Guang-Sheng Li, Yongzhao Zhan, Qirong Mao, Yibin Hou
**DRMR: Dynamic-Ring-Based Multicast Routing Protocol for Ad Hoc Networks.**[Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2004, v:19, n:6, pp:909-919 [Journal] - Yuan Zhou
**From Smart Guesser to Smart Navigator: Changes in Collection Development for Research Libraries in a Networked Environment.**[Citation Graph (0, 0)][DBLP] Library Trends, 1994, v:42, n:4, pp:- [Journal] - Michael Garland, Yuan Zhou
**Quadric-based simplification in any dimension.**[Citation Graph (0, 0)][DBLP] ACM Trans. Graph., 2005, v:24, n:2, pp:209-239 [Journal] - Yuan Zhou, Michael Garland
**Interactive Point-Based Rendering of Higher-Order Tetrahedral Data.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Vis. Comput. Graph., 2006, v:12, n:5, pp:1229-1236 [Journal] - Yuan Zhou, James M. Noras, S. J. Shepherd
**Novel design of multiplier-less FFT processors.**[Citation Graph (0, 0)][DBLP] Signal Processing, 2007, v:87, n:6, pp:1402-1407 [Journal] - Feng Shi, Yong Liu, Tianzi Jiang, Yuan Zhou, Wanlin Zhu, Jiefeng Jiang, Haihong Liu, Zhening Liu
**Regional Homogeneity and Anatomical Parcellation for fMRI Image Classification: Application to Schizophrenia and Normal Controls.**[Citation Graph (0, 0)][DBLP] MICCAI (2), 2007, pp:136-143 [Conf] - Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng
**How to construct secure proxy cryptosystem.**[Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4095-4108 [Journal] - Zhenchuan Chai, Zhen-Fu Cao, Yuan Zhou
**Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts.**[Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:1, pp:103-108 [Journal] **Quantifying Information Leakage for Fully Probabilistic Systems.**[Citation Graph (, )][DBLP]**Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.**[Citation Graph (, )][DBLP]**MarcoPolo: a community system for sharing and integrating travel information on maps.**[Citation Graph (, )][DBLP]**Research on Application of Fuzzy Neural Network in Combine Harvester.**[Citation Graph (, )][DBLP]**Application of Artificial Intelligence Technology in Asphalt Concrete Mixer Control System.**[Citation Graph (, )][DBLP]**Modeling Internet Applications with Event Graphs.**[Citation Graph (, )][DBLP]**Application of fuzzy five states control system base on phase plane in steer by wire system of loader.**[Citation Graph (, )][DBLP]**Supporting Database Applications as a Service.**[Citation Graph (, )][DBLP]**A Surface-Based Fractal Information Dimension Method for Cortical Complexity Analysis.**[Citation Graph (, )][DBLP]**Semi-supervised topic modeling for image annotation.**[Citation Graph (, )][DBLP]**Application of Embedded System in Construction Machinery.**[Citation Graph (, )][DBLP]**Tighter Bounds for Facility Games.**[Citation Graph (, )][DBLP]**An IEEE 802.11 Model for the Planning of Wireless Mesh Networks.**[Citation Graph (, )][DBLP]**Analysis of alpha-domain noise and feature detection for cognitive radio systems.**[Citation Graph (, )][DBLP]**On the alpha-Sensitivity of Nash Equilibria in PageRank-Based Network Reputation Games.**[Citation Graph (, )][DBLP]**Research on Survivability of Mobile Ad Hoc Network.**[Citation Graph (, )][DBLP]**An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.**[Citation Graph (, )][DBLP]**Simulation Analysis of Probabilistic Timing Covert Channels.**[Citation Graph (, )][DBLP]**Design of Eye Tracking System for Real Scene.**[Citation Graph (, )][DBLP]**Optimal lower bounds for locality sensitive hashing (except when q is tiny)**[Citation Graph (, )][DBLP]**Efficient public key encryption with smallest ciphertext expansion from factoring.**[Citation Graph (, )][DBLP]
Search in 0.025secs, Finished in 0.027secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |