Author of the publication

A survey of parallel particle tracing algorithms in flow visualization.

, and . J. Vis., 21 (3): 351-368 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ATM switch buffer management for TCP traffic control., , and . ICCCN, page 193-198. IEEE, (1999)Field Identification of Cold Tolerance of High Oleic Acid Peanut at Germination Stage and Verification of Physiological Indices., , , , and . BIBE, page 9:1-9:5. ACM, (2020)Restoring latent factors against negative transfer using partial-adaptation nonnegative matrix factorization., , and . CCF Trans. Pervasive Comput. Interact., 2 (1): 42-50 (2020)KDM security for identity-based encryption: Constructions and separations., , , and . Inf. Sci., (2019)Towards Secure Data Distribution Systems in Mobile Cloud Computing., , and . IEEE Trans. Mob. Comput., 16 (11): 3222-3235 (2017)Two-Round PAKE from Approximate SPH and Instantiations from Lattices., and . ASIACRYPT (3), volume 10626 of Lecture Notes in Computer Science, page 37-67. Springer, (2017)On the (Quantum) Random Oracle Methodology: New Separations and More., , , , and . IACR Cryptol. ePrint Arch., (2019)KDM Security for Identity-Based Encryption: Constructions and Separations., , , and . IACR Cryptol. ePrint Arch., (2016)Non-Malleable Functions and Their Applications., , , , and . IACR Cryptol. ePrint Arch., (2015)Black-Box Separations for One-More (Static) CDH and Its Generalization., , , , and . ASIACRYPT (2), volume 8874 of Lecture Notes in Computer Science, page 366-385. Springer, (2014)