The SCEAS System
Navigation Menu

Conferences in DBLP

(sersc-isa)
2010 (conf/sersc-isa/2010)


  1. Fuzzy Based Threat Analysis in Total Hospital Information System. [Citation Graph (, )][DBLP]


  2. An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model. [Citation Graph (, )][DBLP]


  3. A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition. [Citation Graph (, )][DBLP]


  4. Information Systems Security Criticality and Assurance Evaluation. [Citation Graph (, )][DBLP]


  5. Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'. [Citation Graph (, )][DBLP]


  6. Directed Graph Pattern Synthesis in LSB Technique on Video Steganography. [Citation Graph (, )][DBLP]


  7. Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning. [Citation Graph (, )][DBLP]


  8. Post-quantum Cryptography: Code-Based Signatures. [Citation Graph (, )][DBLP]


  9. Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol. [Citation Graph (, )][DBLP]


  10. A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  11. An Active Intrusion Detection System for LAN Specific Attacks. [Citation Graph (, )][DBLP]


  12. Analysis on the Improved SVD-Based Watermarking Scheme. [Citation Graph (, )][DBLP]


  13. Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes. [Citation Graph (, )][DBLP]


  14. Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  15. Grammar Encoding in DNA-Like Secret Sharing Infrastructure. [Citation Graph (, )][DBLP]


  16. HATS: High Accuracy Timestamping System Based on NetFPGA. [Citation Graph (, )][DBLP]


  17. A Roadside Unit Placement Scheme for Vehicular Telematics Networks. [Citation Graph (, )][DBLP]


  18. Concurrent Covert Communication Channels. [Citation Graph (, )][DBLP]


  19. Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  20. High Performance MAC Architecture for 3GPP Modem. [Citation Graph (, )][DBLP]


  21. Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T. [Citation Graph (, )][DBLP]


  22. A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]


  23. A Model for Interference on Links in Inter-working Multi-hop Wireless Networks. [Citation Graph (, )][DBLP]


  24. An Optimum ICA Based Multiuser Data Separation for Short Message Service. [Citation Graph (, )][DBLP]


  25. Multiple Asynchronous Requests on a Client-Based Mashup Page. [Citation Graph (, )][DBLP]


  26. Using an Integrated Ontology Database to Categorize Web Pages. [Citation Graph (, )][DBLP]


  27. Topic Detection by Topic Model Induced Distance Using Biased Initiation. [Citation Graph (, )][DBLP]


  28. Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm. [Citation Graph (, )][DBLP]


  29. Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition. [Citation Graph (, )][DBLP]


  30. Agent Based Approach to Regression Testing. [Citation Graph (, )][DBLP]


  31. A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem. [Citation Graph (, )][DBLP]


  32. Development of a Digital Textbook Standard Format Based on XML. [Citation Graph (, )][DBLP]


  33. A Pattern-Based Representation Approach for Online Discourses. [Citation Graph (, )][DBLP]


  34. A Fault Tolerant Architecture for Transportation Information Services of E-Government. [Citation Graph (, )][DBLP]


  35. Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS. [Citation Graph (, )][DBLP]


  36. Extract Semantic Information from WordNet to Improve Text Classification Performance. [Citation Graph (, )][DBLP]


  37. Managing Ubiquitous Scientific Knowledge on Semantic Web. [Citation Graph (, )][DBLP]


  38. A Semantic Pattern Approach to Managing Scientific Publications. [Citation Graph (, )][DBLP]


  39. A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults. [Citation Graph (, )][DBLP]


  40. Markov Chain Monte Carlo Random Testing. [Citation Graph (, )][DBLP]


  41. An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics. [Citation Graph (, )][DBLP]


  42. An Effective Video Steganography Method for Biometric Identification. [Citation Graph (, )][DBLP]


  43. A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction. [Citation Graph (, )][DBLP]


  44. Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis. [Citation Graph (, )][DBLP]


  45. Video Copy Detection: Sequence Matching Using Hypothesis Test. [Citation Graph (, )][DBLP]


  46. An XML-Based Digital Textbook and Its Educational Effectiveness. [Citation Graph (, )][DBLP]


  47. SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition. [Citation Graph (, )][DBLP]


  48. Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network. [Citation Graph (, )][DBLP]


  49. A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming. [Citation Graph (, )][DBLP]


  50. Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech. [Citation Graph (, )][DBLP]


  51. CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture. [Citation Graph (, )][DBLP]


  52. A Power Control Scheme for an Energy-Efficient MAC Protocol. [Citation Graph (, )][DBLP]


  53. Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002