|
Conferences in DBLP
(sersc-isa) 2010 (conf/sersc-isa/2010)
Fuzzy Based Threat Analysis in Total Hospital Information System. [Citation Graph (, )][DBLP]
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model. [Citation Graph (, )][DBLP]
A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition. [Citation Graph (, )][DBLP]
Information Systems Security Criticality and Assurance Evaluation. [Citation Graph (, )][DBLP]
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'. [Citation Graph (, )][DBLP]
Directed Graph Pattern Synthesis in LSB Technique on Video Steganography. [Citation Graph (, )][DBLP]
Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning. [Citation Graph (, )][DBLP]
Post-quantum Cryptography: Code-Based Signatures. [Citation Graph (, )][DBLP]
Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol. [Citation Graph (, )][DBLP]
A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]
An Active Intrusion Detection System for LAN Specific Attacks. [Citation Graph (, )][DBLP]
Analysis on the Improved SVD-Based Watermarking Scheme. [Citation Graph (, )][DBLP]
Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes. [Citation Graph (, )][DBLP]
Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Grammar Encoding in DNA-Like Secret Sharing Infrastructure. [Citation Graph (, )][DBLP]
HATS: High Accuracy Timestamping System Based on NetFPGA. [Citation Graph (, )][DBLP]
A Roadside Unit Placement Scheme for Vehicular Telematics Networks. [Citation Graph (, )][DBLP]
Concurrent Covert Communication Channels. [Citation Graph (, )][DBLP]
Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
High Performance MAC Architecture for 3GPP Modem. [Citation Graph (, )][DBLP]
Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T. [Citation Graph (, )][DBLP]
A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]
A Model for Interference on Links in Inter-working Multi-hop Wireless Networks. [Citation Graph (, )][DBLP]
An Optimum ICA Based Multiuser Data Separation for Short Message Service. [Citation Graph (, )][DBLP]
Multiple Asynchronous Requests on a Client-Based Mashup Page. [Citation Graph (, )][DBLP]
Using an Integrated Ontology Database to Categorize Web Pages. [Citation Graph (, )][DBLP]
Topic Detection by Topic Model Induced Distance Using Biased Initiation. [Citation Graph (, )][DBLP]
Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm. [Citation Graph (, )][DBLP]
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition. [Citation Graph (, )][DBLP]
Agent Based Approach to Regression Testing. [Citation Graph (, )][DBLP]
A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem. [Citation Graph (, )][DBLP]
Development of a Digital Textbook Standard Format Based on XML. [Citation Graph (, )][DBLP]
A Pattern-Based Representation Approach for Online Discourses. [Citation Graph (, )][DBLP]
A Fault Tolerant Architecture for Transportation Information Services of E-Government. [Citation Graph (, )][DBLP]
Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS. [Citation Graph (, )][DBLP]
Extract Semantic Information from WordNet to Improve Text Classification Performance. [Citation Graph (, )][DBLP]
Managing Ubiquitous Scientific Knowledge on Semantic Web. [Citation Graph (, )][DBLP]
A Semantic Pattern Approach to Managing Scientific Publications. [Citation Graph (, )][DBLP]
A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults. [Citation Graph (, )][DBLP]
Markov Chain Monte Carlo Random Testing. [Citation Graph (, )][DBLP]
An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics. [Citation Graph (, )][DBLP]
An Effective Video Steganography Method for Biometric Identification. [Citation Graph (, )][DBLP]
A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction. [Citation Graph (, )][DBLP]
Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis. [Citation Graph (, )][DBLP]
Video Copy Detection: Sequence Matching Using Hypothesis Test. [Citation Graph (, )][DBLP]
An XML-Based Digital Textbook and Its Educational Effectiveness. [Citation Graph (, )][DBLP]
SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition. [Citation Graph (, )][DBLP]
Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network. [Citation Graph (, )][DBLP]
A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming. [Citation Graph (, )][DBLP]
Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech. [Citation Graph (, )][DBLP]
CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture. [Citation Graph (, )][DBLP]
A Power Control Scheme for an Energy-Efficient MAC Protocol. [Citation Graph (, )][DBLP]
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks. [Citation Graph (, )][DBLP]
|