Skip to main content

previous disabled Page of 535
and
  1. No Access

    Chapter and Conference Paper

    Distributed Supercomputing for Graphics Applications: A Case Study on an Implementation of the Radiosity Approach

    Besides the ray tracing technique, the radiosity method is another major approach for global illumination modeling in the field of computer graphics. Since this method needs a huge amount of storage space (bot...

    Jose Encarnacao, Georg Köberle, Ning Zhang in Supercomputer ’89 (1989)

  2. No Access

    Chapter and Conference Paper

    Permutation generators of alternating groups

    The problem of generation of permutations from small ones is especially important from a cryptographic point of view. This work explores the case This work addresses the design of cryptographic systems using e...

    Josef Pieprzyk, **an-Mo Zhang in Advances in Cryptology — AUSCRYPT '90 (1990)

  3. No Access

    Chapter and Conference Paper

    The Case of China: General Framework and a Specific Situation

    This section is dedicated to the situation of the information systems in China. After an overview on the progress in the development of computer-based retrieval systems over the past ten years and a descriptio...

    Gao Chongqian, Zhang Fenglou, Baowei Fang in Bridging the Information Gap (1990)

  4. No Access

    Chapter and Conference Paper

    Determining the Needs

    This section addresses the first phase of the development of the information systems for SMEs, namely, the analysis of the information needs and user cosiderations.

    Zhou Zhiyou, Du Baorong, Zhang Baoming, Keith W. Reynard in Bridging the Information Gap (1990)

  5. No Access

    Chapter and Conference Paper

    An admission control algorithm for predictive real-time service (extended abstract)

    Sugih Jamin, Scott Shenker, Lixia Zhang in Network and Operating System Support for D… (1993)

  6. No Access

    Chapter and Conference Paper

    Using hammock graphs to eliminate nonstructured branch statements

    The detection of parallelism is based on the dependence analysis of the program. One of the key problems is to partition the program into independent subtasks in the presence of control statements (MIMD). In t...

    Fubo Zhang, Erik H. D'Hollander in PARLE '93 Parallel Architectures and Languages Europe (1993)

  7. No Access

    Chapter and Conference Paper

    Preliminary measurement of the RMTP/RTIP

    The Real-time Message Transport Protocol (RMTP) and the Real-Time Internetwork Protocol (RTIP) are the transport and network layer data delivery protocols in the Tenet Protocol Suite. We implemented the protoc...

    Hui Zhang, Tom Fisher in Network and Operating System Support for Digital Audio and Video (1993)

  8. No Access

    Chapter and Conference Paper

    Enhancing parallelism by removing cyclic data dependencies

    The parallel execution of loop iterations often is inhibited by recurrence relations on scalar variables. Examples are the use of induction variables and recursive functions. Due to the cyclic dependence betwe...

    Fubo Zhang, Erik H. D'Hollander in PARLE'94 Parallel Architectures and Languages Europe (1994)

  9. Chapter and Conference Paper

    Pitfalls in Designing Substitution Boxes

    Two significant recent advances in cryptanalysis, namely the differential attack put forward by Biham and Shamir [3] and the linear attack by Matsui [7, 8], have had devastating impact on data encryption algorith...

    Jennifer Seberry, **an-Mo Zhang, Yuliang Zheng in Advances in Cryptology — CRYPTO ’94 (1994)

  10. No Access

    Chapter and Conference Paper

    Structures of cryptographic functions with strong avalanche characteristics

    This paper studies the properties and constructions of nonlinear functions, which are a core component of cryptographic primitives including data encryption algorithms and one-way hash functions. A main contri...

    Jennifer Seberry, **an -Mo Zhang, Yuliang Zheng in Advances in Cryptology — ASIACRYPT'94 (1995)

  11. Chapter and Conference Paper

    On Nonlinear Resilient Functions

    This paper studies resilient functions which have applica- tions in fault-tolerant distributed computing, quantum cryptographic key distribution and random sequence generation for stream ciphers. We present a ...

    **an-Mo Zhang, Yuliang Zheng in Advances in Cryptology — EUROCRYPT ’95 (1995)

  12. No Access

    Chapter and Conference Paper

    RED-VBR: A new approach to support delay-sensitive VBR video in packet-switched networks

    Previous approaches to supporting video on packet-switched networks include deterministic service, statistical service, predicted service, and feedback-based schemes. These schemes represent different tradeoff...

    Hui Zhang, Edward W. Knightly in Network and Operating Systems Support for … (1995)

  13. No Access

    Chapter and Conference Paper

    Neural network strategies for solving synthesis problems in non-conflict cases in distributed expert systems

    In this paper, two neural network mechanisms for synthesis of solutions in non-conflict cases in distributed expert systems (DESs) are proposed. The ideas are: inputs of the neural network are different soluti...

    Minjie Zhang, Chengqi Zhang in Distributed Artificial Intelligence Archit… (1996)

  14. No Access

    Chapter and Conference Paper

    Distributed concurrency control in real-time cooperative editing systems

    Efficient distributed concurrency control is one of the most significant challenges in building real-time cooperative editing systems. In this paper, we focus on the definition and verification of an integrate...

    C. Sun, Y. Yang, Y. Zhang, D. Chen in Concurrency and Parallelism, Programming, … (1996)

  15. No Access

    Chapter and Conference Paper

    Definition and application of a comprehensive framework for distributed problem solving

    In the Distributed Artificial Intelligence community, the term “Distributed Problem Solving (DPS)” is widely used. However, different people refer to different types of DPS frameworks. In this paper, we define...

    Hongxia Yang, Chengqi Zhang in Distributed Artificial Intelligence Archit… (1996)

  16. Chapter and Conference Paper

    Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions

    It is a well known fact that the nonlinearity of a function f on the n-dimensional vector space V n is bounded from above by 2n−1 − 21/2n−1. In cryptographic practice, nonlinear functions are usua...

    **an-Mo Zhang, Yuliang Zheng in Advances in Cryptology — EUROCRYPT ’96 (1996)

  17. No Access

    Chapter and Conference Paper

    A declustering algorithm for minimising spatial join cost

    Spatial joins are important, yet time-consuming operations in spatial databases. In this paper we consider to minimise the I/O cost for the spatial join processing. A graph model is proposed to formalise the c...

    Yanchun Zhang, Jitian **ao, **aofang Zhou in Computing and Combinatorics (1997)

  18. No Access

    Chapter and Conference Paper

    Many-to-one packet routing via matchings

    In this paper we study the packet routing problem under the matching model proposed by Alon, Chung and Graham [1]. We extend the model to allow more than one packet per origin and destination node. We give tig...

    Danny Krizanc, Louxin Zhang in Computing and Combinatorics (1997)

  19. No Access

    Chapter and Conference Paper

    Rearrangeable graphs

    Interconnection networks play an important role in parallel computing systems. A lot of effort has been made to construct rearrangeable networks. This paper generalizes the concept of rearrangeability to gener...

    Qing Hu, Yixin Zhang, **aojun Shen in Computing and Combinatorics (1997)

  20. No Access

    Chapter and Conference Paper

    Duality of Boolean functions and its cryptographic significance

    Recent advances in interpolation and high order differential cryptanalysis have highlighted the cryptographic significance of Boolean functions with a high algebraic degree. However, compared with other nonlin...

    **an-Mo Zhang, Yuliang Zheng, Hideki Imai in Information and Communications Security (1997)

previous disabled Page of 535