Academic literature on the topic 'Hierarchical schemes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hierarchical schemes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hierarchical schemes"
Si, Jing Jing. "A Hierarchical Multicast Scheme for Heterogeneous Receivers." Advanced Materials Research 108-111 (May 2010): 57–62. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.57.
Full textAlam, Irfan, Amal S. Alali, Shakir Ali, and Muhammad S. M. Asri. "A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure." Axioms 13, no. 8 (2024): 515. http://dx.doi.org/10.3390/axioms13080515.
Full textQihong Yu, Qihong Yu, Jian Shen Qihong Yu, Jin-Feng Lai Jian Shen, and Sai Ji Jin-Feng Lai. "Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption." 網際網路技術學刊 23, no. 6 (2022): 1287–96. http://dx.doi.org/10.53106/160792642022112306011.
Full textSun, Lin Lin, Chun An You, Jian Xin Liu, and Qiu Yuan Liu. "Research on Treatment Scheme Optimization for Slope Based on Analytic Hierarchy Process." Applied Mechanics and Materials 90-93 (September 2011): 402–5. http://dx.doi.org/10.4028/www.scientific.net/amm.90-93.402.
Full textTOCHIKUBO, Kouya. "General Secret Sharing Schemes Using Hierarchical Threshold Scheme." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 9 (2019): 1037–47. http://dx.doi.org/10.1587/transfun.e102.a.1037.
Full textChen, Chien-Ming, Xinying Zheng, and Tsu-Yang Wu. "A Complete Hierarchical Key Management Scheme for Heterogeneous Wireless Sensor Networks." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/816549.
Full textLangrehr, Roman, and Jiaxin Pan. "Tightly Secure Hierarchical Identity-Based Encryption." Journal of Cryptology 33, no. 4 (2020): 1787–821. http://dx.doi.org/10.1007/s00145-020-09356-x.
Full textWu, Miqi, Lin You, Gengran Hu, Liang Li, and Chengtang Cao. "A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture." Security and Communication Networks 2021 (April 22, 2021): 1–20. http://dx.doi.org/10.1155/2021/5592119.
Full textZhao, Nan Nan, and Jian Bo Yao. "Hybrid Key Management Scheme for WSN." Applied Mechanics and Materials 513-517 (February 2014): 424–30. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.424.
Full textTian, Qiuting, Dezhi Han, and Yanmei Jiang. "Hierarchical authority based weighted attribute encryption scheme." Computer Science and Information Systems 16, no. 3 (2019): 797–813. http://dx.doi.org/10.2298/csis180912027t.
Full textDissertations / Theses on the topic "Hierarchical schemes"
MURALIDHAR, KURUDI HANUMANTHARAO. "HIERARCHICAL SCHEMES FOR ROUTING AND FLOW CONTROL IN COMMUNICATION NETWORKS." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187913.
Full textCastiglione, Arcangelo. "New Insights on cryptographic hierarchical access control: models, schemes and analysis." Doctoral thesis, Universita degli studi di Salerno, 2016. http://hdl.handle.net/10556/2489.
Full textGiang, Truong Minh Triet, and trietgiang@yahoo com. "Efficient Admission Control Schemes in Cellular IP Networks." RMIT University. Electrical and Computer Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20060829.113000.
Full textFidelman, Emily S. "Metadata Quality and the Use of Hierarchical Schemes to Determine Meta Keywords: An Exploration." Thesis, School of Information and Library Science, 2006. http://hdl.handle.net/1901/288.
Full textAlexander, Simon. "Two- and Three-Dimensional Coding Schemes for Wavelet and Fractal-Wavelet Image Compression." Thesis, University of Waterloo, 2001. http://hdl.handle.net/10012/1180.
Full textZabanoot, Zaid Ahmed Said. "Modelling and Analysis of Resource Management Schemes in Wireless Networks. Analytical Models and Performance Evaluation of Handoff Schemes and Resource Re-Allocation in Homogeneous and Heterogeneous Wireless Cellular Networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5383.
Full textTomaras, Panagiotis J. "Decomposition of general queueing network models : an investigation into the implementation of hierarchical decomposition schemes of general closed queueing network models using the principle of minimum relative entropy subject to fully decomposable constraints." Thesis, University of Bradford, 1989. http://hdl.handle.net/10454/4212.
Full textSpence, James B. "Habitat analysis by hierarchical scheme and stream geomorphology." Huntington, WV : [Marshall University Libraries], 2005. http://www.marshall.edu/etd/descript.asp?ref=555.
Full textBakolas, Efstathios. "A Hierarchical On-Line Path Planning Scheme using Wavelets." Thesis, Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14489.
Full textJimenez, Carrizosa Miguel. "Hierarchical control scheme for multi-terminal high voltage direct current power networks." Thesis, Paris 11, 2015. http://www.theses.fr/2015PA112039/document.
Full textBooks on the topic "Hierarchical schemes"
Farkas, Keith I. A decentralized hierarchical cache-consistency scheme for shared-memory multiprocessors. National Library of Canada = Bibliothèque nationale du Canada, 1991.
Find full textUnited States. National Aeronautics and Space Administration., ed. Parallelized modelling and solution scheme for hierarchically scaled simulations: Final report. National Aeronautics and Space Administration, 1995.
Find full textLeibo, Joel Z., and Tomaso Poggio. Perception. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199674923.003.0025.
Full textBooij, Geert. Inheritance and motivation in Construction Morphology. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198712329.003.0002.
Full textBooij, Geert E. Morphology in Construction Grammar. Edited by Thomas Hoffmann and Graeme Trousdale. Oxford University Press, 2013. http://dx.doi.org/10.1093/oxfordhb/9780195396683.013.0014.
Full textDamer, Seán. Scheming. Edinburgh University Press, 2018. http://dx.doi.org/10.3366/edinburgh/9781474440561.001.0001.
Full textCorcoran, Andrew W., and Jakob Hohwy. Allostasis, interoception, and the free energy principle: Feeling our way forward. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198811930.003.0015.
Full textHeiner, Karl W., Marc Kennedy, and Anthony O'Hagan. Sequential multilocation auditing and the New York food stamps program. Edited by Anthony O'Hagan and Mike West. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780198703174.013.23.
Full textSobczyk, Eugeniusz Jacek. Uciążliwość eksploatacji złóż węgla kamiennego wynikająca z warunków geologicznych i górniczych. Instytut Gospodarki Surowcami Mineralnymi i Energią PAN, 2022. http://dx.doi.org/10.33223/onermin/0222.
Full textBook chapters on the topic "Hierarchical schemes"
Batyrshin, Ildar, and Tamas Rudas. "Invariant Hierarchical Clustering Schemes." In Perception-based Data Mining and Decision Making in Economics and Finance. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-36247-0_7.
Full textVasquez, Daniel, Rainer Gruhn, and Wolfgang Minker. "Hierarchical Approach and Downsampling Schemes." In Signals and Communication Technology. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-34425-1_4.
Full textChin, Ji-Jian, Swee-Huay Heng, and Bok-Min Goi. "Hierarchical Identity-Based Identification Schemes." In Security Technology. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10847-1_12.
Full textFarràs, Oriol, and Carles Padró. "Ideal Hierarchical Secret Sharing Schemes." In Theory of Cryptography. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11799-2_14.
Full textFerrara, Anna Lisa, Federica Paci, and Chiara Ricciardi. "Verifiable Hierarchical Key Assignment Schemes." In Data and Applications Security and Privacy XXXV. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81242-3_21.
Full textBhatia, Randeep, Rakesh K. Sinha, and Chung-Min Chen. "Hierarchical Declustering Schemes for Range Queries." In Advances in Database Technology — EDBT 2000. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-46439-5_36.
Full textVergauwen, Philip. "Technological Spillovers and Incentive Schemes for R&D." In Design Models for Hierarchical Organizations. Springer US, 1995. http://dx.doi.org/10.1007/978-1-4615-2285-0_10.
Full textIshida, K. "Space-Time Tradeoff in Hierarchical Routing Schemes." In Responsive Computer Systems. Springer Vienna, 1993. http://dx.doi.org/10.1007/978-3-7091-9288-7_8.
Full textDe Santis, Alfredo, Anna Lisa Ferrara, and Barbara Masucci. "Efficient Provably-Secure Hierarchical Key Assignment Schemes." In Mathematical Foundations of Computer Science 2007. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74456-6_34.
Full textVadi, Vikas Rao, Naveen Kumar, and Shafiqul Abidin. "Classifying Time-Bound Hierarchical Key Assignment Schemes." In Advances in Computer, Communication and Computational Sciences. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4409-5_10.
Full textConference papers on the topic "Hierarchical schemes"
Xie, Jian, Zhi Tan, Yueming Lu, and Yuefeng Ji. "A comparative study of restoration schemes and a new hierarchical hybrid restoration scheme in hierarchical networks." In Asia-Pacific Optical Communications, edited by Yong Hyub Won, Gee-Kung Chang, Ken-ichi Sato, and Jian Wu. SPIE, 2006. http://dx.doi.org/10.1117/12.688484.
Full textYan Zhang and Boon-Hee Soong. "Take-back schemes in hierarchical cellular systems." In GLOBECOM '05. IEEE Global Telecommunications Conference, 2005. IEEE, 2005. http://dx.doi.org/10.1109/glocom.2005.1577348.
Full textZurawski, J., and Dajin Wang. "Fault-Tolerance Schemes for Hierarchical Mesh Networks." In Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05). IEEE, 2005. http://dx.doi.org/10.1109/pdcat.2005.140.
Full textCimorelli Belfiore, Roberta, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci. "Hierarchical Key Assignment Schemes with Key Rotation." In SACMAT 2024: The 29th ACM Symposium on Access Control Models and Technologies. ACM, 2024. http://dx.doi.org/10.1145/3649158.3657037.
Full textWang, Pingjian, Jing Lin, Jiwu Jing, and Yongquan Xie. "Mediated Hierarchical Identity-Based Combined Public Key Schemes." In 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI). IEEE, 2010. http://dx.doi.org/10.1109/iitsi.2010.20.
Full textAteniese, Giuseppe, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci. "Provably-secure time-bound hierarchical key assignment schemes." In the 13th ACM conference. ACM Press, 2006. http://dx.doi.org/10.1145/1180405.1180441.
Full textDuan, Xiaoni, and Keishi Tajima. "Improving Multiclass Classification in Crowdsourcing by Using Hierarchical Schemes." In The World Wide Web Conference. ACM Press, 2019. http://dx.doi.org/10.1145/3308558.3313749.
Full textShankar, Prabhu, Beshoy Morkos, and Joshua D. Summers. "A Hierarchical Modeling Scheme With Non Functional Requirements." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28544.
Full textHill, Elyse D., Donald L. Simon, and Joseph W. Connolly. "A Comparison of Model Predictive Control Architectures for Application to Electrified Aircraft Propulsion Systems." In ASME Turbo Expo 2024: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2024. http://dx.doi.org/10.1115/gt2024-123859.
Full textSaha, Sajal, Subhasree Bhattacharjee, Rajib Nath Bhowmick, Asish K. Mukhupadhyay, and Dhinaharan Nagamalai. "Analysis of Hierarchical Mobile IP Based Fast Mobility Management Schemes." In 2009 First International Conference on Networks & Communications. IEEE, 2009. http://dx.doi.org/10.1109/netcom.2009.81.
Full textReports on the topic "Hierarchical schemes"
Cooper, David A., Daniel C. Apon, Quynh H. Dang, Michael S. Davidson, Morris J. Dworkin, and Carl A. Miller. Recommendation for Stateful Hash-Based Signature Schemes. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.sp.800-208.
Full textShen, Jun, Chi-Wang Shu, and Mengping Zhang. A High Order WENO Scheme for a Hierarchical Size-Structured Model. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada468112.
Full textStruik, L. C., and M. B. Quat. Hierarchical classification of tectonic assemblages for use with thematic, computer-based query systems: a preliminary scheme. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2002. http://dx.doi.org/10.4095/213699.
Full textTelles, Edward E., Stanley R. Bailey, Shahin Davoudpour, and Nicholas C. Freeman. Racial and Ethnic Inequality in Latin America. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005238.
Full textNeroda, Tetyana V., Lidia V. Slipchyshyn, and Ivan O. Muzyka. Adaptive toolkit of branch-oriented workshop environment for enlargement the cloud-based e-learning media platform. [б. в.], 2021. http://dx.doi.org/10.31812/123456789/4449.
Full textLawley, C. J. M., P. Giddy, L. Katz, et al. Canada geological map compilation. Natural Resources Canada/CMSS/Information Management, 2024. http://dx.doi.org/10.4095/pf995j5tgu.
Full textLawley, C. J. M., P. Giddy, L. Katz, et al. Canada geological map compilation. Natural Resources Canada/CMSS/Information Management, 2024. http://dx.doi.org/10.4095/332596.
Full textWells, Aaron, Tracy Christopherson, Gerald Frost, et al. Ecological land survey and soils inventory for Katmai National Park and Preserve, 2016–2017. National Park Service, 2021. http://dx.doi.org/10.36967/nrr-2287466.
Full textMcPhedran, R., K. Patel, B. Toombs, et al. Food allergen communication in businesses feasibility trial. Food Standards Agency, 2021. http://dx.doi.org/10.46756/sci.fsa.tpf160.
Full text