Search the dblp DataBase
Yuan Zhou :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yuan Zhou , Guangsheng Li , Qirong Mao , Yongzhao Zhan , Yibin Hou Design and Simulation of Multicast Routing Protocol for Mobile Internet. [Citation Graph (0, 0)][DBLP ] APWeb, 2004, pp:887-890 [Conf ] Yuan Zhou , Zhenfu Cao , Rongxing Lu Constructing Secure Warrant-Based Proxy Signcryption Schemes. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:172-185 [Conf ] Yuan Zhou , Quan-Lin Li , Song De Ma Visualization of Geostress Tensor along Oil Well Trajectory. [Citation Graph (0, 0)][DBLP ] Computer Graphics International, 2001, pp:317-320 [Conf ] Shanshan Duan , Zhenfu Cao , Yuan Zhou Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:445-450 [Conf ] Yuan Zhou , Zhenfu Cao , Zhenchuan Chai Constructing Secure Proxy Cryptosystem. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:150-161 [Conf ] Reza Abedi , Shuo-Heng Chung , Jeff Erickson , Yong Fan , Michael Garland , Damrong Guoy , Robert Haber , John M. Sullivan , Shripad Thite , Yuan Zhou Spacetime meshing with adaptive refinement and coarsening. [Citation Graph (0, 0)][DBLP ] Symposium on Computational Geometry, 2004, pp:300-309 [Conf ] Zhenchuan Chai , Zhenfu Cao , Yuan Zhou Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network. [Citation Graph (0, 0)][DBLP ] IMSCCS (2), 2006, pp:148-154 [Conf ] Zhenchuan Chai , Zhenfu Cao , Yuan Zhou Encryption Based on Reversible Second-Order Cellular Automata. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:350-358 [Conf ] Yuan Zhou , Zhenfu Cao , Zhenchuan Chai An Efficient Proxy-Protected Signature Scheme Based on Factoring. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:332-341 [Conf ] Yuan Zhou , Zhenfu Cao , Zhenchuan Chai Identity Based Key Insulated Signature. [Citation Graph (0, 0)][DBLP ] ISPEC, 2006, pp:226-234 [Conf ] Yuan Zhou , Michael Garland , Robert Haber Pixel-Exact Rendering of Spacetime Finite Element Solutions. [Citation Graph (0, 0)][DBLP ] IEEE Visualization, 2004, pp:425-432 [Conf ] Yuan Zhou , Guang-Sheng Li , Yongzhao Zhan , Qirong Mao , Yibin Hou DRMR: Dynamic-Ring-Based Multicast Routing Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2004, v:19, n:6, pp:909-919 [Journal ] Yuan Zhou From Smart Guesser to Smart Navigator: Changes in Collection Development for Research Libraries in a Networked Environment. [Citation Graph (0, 0)][DBLP ] Library Trends, 1994, v:42, n:4, pp:- [Journal ] Michael Garland , Yuan Zhou Quadric-based simplification in any dimension. [Citation Graph (0, 0)][DBLP ] ACM Trans. Graph., 2005, v:24, n:2, pp:209-239 [Journal ] Yuan Zhou , Michael Garland Interactive Point-Based Rendering of Higher-Order Tetrahedral Data. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Vis. Comput. Graph., 2006, v:12, n:5, pp:1229-1236 [Journal ] Yuan Zhou , James M. Noras , S. J. Shepherd Novel design of multiplier-less FFT processors. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2007, v:87, n:6, pp:1402-1407 [Journal ] Feng Shi , Yong Liu , Tianzi Jiang , Yuan Zhou , Wanlin Zhu , Jiefeng Jiang , Haihong Liu , Zhening Liu Regional Homogeneity and Anatomical Parcellation for fMRI Image Classification: Application to Schizophrenia and Normal Controls. [Citation Graph (0, 0)][DBLP ] MICCAI (2), 2007, pp:136-143 [Conf ] Yuan Zhou , Binxing Fang , Zhenfu Cao , Xiao-chun Yun , Xiaoming Cheng How to construct secure proxy cryptosystem. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:19, pp:4095-4108 [Journal ] Zhenchuan Chai , Zhen-Fu Cao , Yuan Zhou Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2007, v:22, n:1, pp:103-108 [Journal ] Quantifying Information Leakage for Fully Probabilistic Systems. [Citation Graph (, )][DBLP ] Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP ] MarcoPolo: a community system for sharing and integrating travel information on maps. [Citation Graph (, )][DBLP ] Research on Application of Fuzzy Neural Network in Combine Harvester. [Citation Graph (, )][DBLP ] Application of Artificial Intelligence Technology in Asphalt Concrete Mixer Control System. [Citation Graph (, )][DBLP ] Modeling Internet Applications with Event Graphs. [Citation Graph (, )][DBLP ] Application of fuzzy five states control system base on phase plane in steer by wire system of loader. [Citation Graph (, )][DBLP ] Supporting Database Applications as a Service. [Citation Graph (, )][DBLP ] A Surface-Based Fractal Information Dimension Method for Cortical Complexity Analysis. [Citation Graph (, )][DBLP ] Semi-supervised topic modeling for image annotation. [Citation Graph (, )][DBLP ] Application of Embedded System in Construction Machinery. [Citation Graph (, )][DBLP ] Tighter Bounds for Facility Games. [Citation Graph (, )][DBLP ] An IEEE 802.11 Model for the Planning of Wireless Mesh Networks. [Citation Graph (, )][DBLP ] Analysis of alpha-domain noise and feature detection for cognitive radio systems. [Citation Graph (, )][DBLP ] On the alpha-Sensitivity of Nash Equilibria in PageRank-Based Network Reputation Games. [Citation Graph (, )][DBLP ] Research on Survivability of Mobile Ad Hoc Network. [Citation Graph (, )][DBLP ] An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. [Citation Graph (, )][DBLP ] Simulation Analysis of Probabilistic Timing Covert Channels. [Citation Graph (, )][DBLP ] Design of Eye Tracking System for Real Scene. [Citation Graph (, )][DBLP ] Optimal lower bounds for locality sensitive hashing (except when q is tiny) [Citation Graph (, )][DBLP ] Efficient public key encryption with smallest ciphertext expansion from factoring. [Citation Graph (, )][DBLP ] Search in 0.016secs, Finished in 0.018secs