The SCEAS System
Navigation Menu

Conferences in DBLP

Computational and Information Science (cis)
2005 (conf/cis/2005-2)

  1. Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim
    A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m). [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1-8 [Conf]
  2. Chunxiang Gu, Yuefei Zhu, YaJuan Zhang
    An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:9-16 [Conf]
  3. Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii
    FMS Attack-Resistant WEP Implementation Is Still Broken. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:17-26 [Conf]
  4. Ping Dong, Xiangdong Shi, Jiehui Yang
    Design of a New Kind of Encryption Kernel Based on RSA Algorithm. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:27-32 [Conf]
  5. Yoon Cheol Lee, Hiroshi Doi
    On the Security of Condorcet Electronic Voting Scheme. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:33-42 [Conf]
  6. Qian Yin, Yunlun Luo, Ping Guo
    Special Distribution of the Shortest Linear Recurring Sequences in Z /(p) Field. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:43-48 [Conf]
  7. Jingmei Liu, Xiangguo Cheng, Xinmei Wang
    Cryptanalysis of a Cellular Automata Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:49-54 [Conf]
  8. Geoff Skinner, Song Han, Elizabeth Chang
    A New Conceptual Framework Within Information Privacy: Meta Privacy. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:55-61 [Conf]
  9. Fengtong Wen, Wenling Wu, Qiaoyan Wen
    Error Oracle Attacks on Several Modes of Operation. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:62-67 [Conf]
  10. Lihua Dong, Yong Zeng, Yupu Hu
    Stability of the Linear Complexity of the Generalized Self-shrinking Sequences. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:68-73 [Conf]
  11. Yajing Li, Weihong Chen
    On the Construction of Some Optimal Polynomial Codes. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:74-79 [Conf]
  12. Xuebing Zhou, Martin Schmucker, Christopher L. Brown
    Perceptual Hashing of Video Content Based on Differential Block Similarity. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:80-85 [Conf]
  13. Seung Wook Jung, Christoph Ruland
    Secure Software Smartcard Resilient to Capture. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:86-95 [Conf]
  14. Kewei Lv
    Revised Fischlin's (Blind) Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:96-103 [Conf]
  15. Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
    Certificateless Threshold Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:104-109 [Conf]
  16. M. Choudary Gorantla, Ashutosh Saxena
    An Efficient Certificateless Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:110-116 [Conf]
  17. Xiaofeng Chen, Fangguo Zhang, Shengli Liu
    ID-Based Restrictive Partially Blind Signatures. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:117-124 [Conf]
  18. Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho
    Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:125-130 [Conf]
  19. Sujing Zhou, Dongdai Lin
    On Anonymity of Group Signatures. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:131-136 [Conf]
  20. Yuqing Zhang, Zhiling Wang, Bo Yang
    The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:137-142 [Conf]
  21. Jin Wook Byun, Dong Hoon Lee, Jongin Lim
    Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:143-148 [Conf]
  22. Qiang Tang, Chris J. Mitchell
    On the Security of Some Password-Based Key Agreement Schemes. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:149-154 [Conf]
  23. Yong Xu, Yuxiang Sun
    A New Group Rekeying Method in Secure Multicast. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:155-160 [Conf]
  24. Jian Liao, Yinghao Qi, Peiwei Huang, Mentian Rong
    Pairing-Based Provable Blind Signature Scheme Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:161-166 [Conf]
  25. Qin Wang, Zhenfu Cao
    Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:167-172 [Conf]
  26. Changgen Peng, Xiang Li
    An Identity-Based Threshold Signcryption Scheme with Semantic Security. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:173-179 [Conf]
  27. Li Hui, Shen Ting
    A Token-Based Single Sign-On Protocol. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:180-185 [Conf]
  28. Shaohua Tang
    Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:186-191 [Conf]
  29. Qiang Tang, Chris J. Mitchell
    Efficient Compilers for Authenticated Group Key Exchange. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:192-197 [Conf]
  30. Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto
    Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:198-203 [Conf]
  31. Ki-Won Yeom, Ji-Hyung Park
    An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:204-211 [Conf]
  32. Ping Wang, Binxing Fang, Xiao-chun Yun
    A New User-Habit Based Approach for Early Warning of Worms. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:212-219 [Conf]
  33. Il-Seop Song, Youngseok Lee, Taeck-Geun Kwon
    A Multi-gigabit Virus Detection Algorithm Using Ternary CAM. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:220-227 [Conf]
  34. Yong Zeng, Jianfeng Ma
    Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:228-235 [Conf]
  35. Saraswathi Sachidananda, Srividya Gopalan, Sridhar Varadarajan
    Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:236-243 [Conf]
  36. Junfeng Tian, Weidong Zhao, Ruizhong Du
    D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:244-251 [Conf]
  37. Yuji Waizumi, Daisuke Kudo, Nei Kato, Yoshiaki Nemoto
    A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:252-259 [Conf]
  38. Seongje Cho, Hye-Young Chang, HongGeun Kim, WoongChul Choi
    SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:260-266 [Conf]
  39. Ming Li, Wei Zhao
    A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:267-272 [Conf]
  40. Vidyasagar Potdar, Chen Wu, Elizabeth Chang
    Tamper Detection for Ubiquitous RFID-Enabled Supply Chain. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:273-278 [Conf]
  41. Wei Yan
    Measuring the Histogram Feature Vector for Anomaly Network Traffic. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:279-284 [Conf]
  42. Kyunghwan Baek, Heejun Jang, Youngjun Han, Hernsoo Hahn
    Efficient Small Face Detection in Surveillance Images Using Major Color Component and LDA Scheme. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:285-290 [Conf]
  43. Jin Zheng, Bo Li, Bing Zhou, Wei Li
    Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:291-296 [Conf]
  44. Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi
    Reducing Worm Detection Time and False Alarm in Virus Throttling. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:297-302 [Conf]
  45. Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim
    Protection Against Format String Attacks by Binary Rewriting. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:303-308 [Conf]
  46. Zhanchun Li, Zhitang Li, Yao Li, Bin Liu
    Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:309-314 [Conf]
  47. Cheng Zhang, Qinke Peng
    Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:315-321 [Conf]
  48. Xiaojuan Sun, Xinliang Zhou, Ninghui Sun, Mingyu Chen
    Parallel Optimization Technology for Backbone Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:322-327 [Conf]
  49. Linru Ma, Lin Yang, Jianxin Wang
    Attack Scenario Construction Based on Rule and Fuzzy Clustering. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:328-333 [Conf]
  50. Lingjuan Li, Wenyu Tang, Ruchuan Wang
    A CBR Engine Adapting to IDS. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:334-339 [Conf]
  51. Hee Suk Seo, Tae Ho Cho
    Application of Fuzzy Logic for Distributed Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:340-347 [Conf]
  52. Syed Naqvi, Michel Riguidel
    Dynamic Access Control for Pervasive Grid Applications. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:348-355 [Conf]
  53. Xinghua Li, Jianfeng Ma, Sang-Jae Moon
    On the Security of the Canetti-Krawczyk Model. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:356-363 [Conf]
  54. Yi Shi, Xinyu Yang
    A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:364-374 [Conf]
  55. Dayin Wang, Dongdai Lin, Wenling Wu
    A Variant of Poly1305 MAC and Its Security Proof. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:375-380 [Conf]
  56. Jianjun Shen, Sihan Qing, Qingni Shen, LiPing Li
    Covert Channel Identification Founded on Information Flow Analysis. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:381-387 [Conf]
  57. André Årnes, Karin Sallhammar, Kjetil Haslum, Tønnes Brekne, Marie Elisabeth Gaup Moe, Svein J. Knapskog
    Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:388-397 [Conf]
  58. Xiaofeng Rong, Xiaojuan Gao, Ruidan Su, Lihua Zhou
    Design and Implementation of a Parallel Crypto Server. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:398-406 [Conf]
  59. Xuegang Lin, Rongsheng Xu, Miaoliang Zhu
    Survivability Computation of Networked Information Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:407-414 [Conf]
  60. Yongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun
    Assessment of Windows System Security Using Vulnerability Relationship Graph. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:415-420 [Conf]
  61. Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang
    A New (t, n)-Threshold Multi-secret Sharing Scheme. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:421-426 [Conf]
  62. Sang-ho Park, Taekyoung Kwon
    An Efficient Message Broadcast Authentication Scheme for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:427-432 [Conf]
  63. Fan Zhang, Xinhong Zhang, Zhiguo Chen
    Digital Image Authentication Based on Error-Correction Codes. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:433-438 [Conf]
  64. Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song
    Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:439-444 [Conf]
  65. Shanshan Duan, Zhenfu Cao, Yuan Zhou
    Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:445-450 [Conf]
  66. Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim
    Building Security Requirements Using State Transition Diagram at Security Threat Location. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:451-456 [Conf]
  67. Weiping Liu, Wandong Cai
    Study on Security iSCSI Based on SSH. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:457-462 [Conf]
  68. Kenli Li, Yan He, Renfa Li, Tao Yang
    A Scheduling Algorithm Based on a Trust Mechanism in Grid. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:463-468 [Conf]
  69. Byungil Lee, Howon Kim
    Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:469-475 [Conf]
  70. Yunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma
    Worm Propagation Modeling and Analysis on Network. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:476-481 [Conf]
  71. Hong Zhang, Haixin Duan, Wu Liu, Jianping Wu
    An Extensible AAA Infrastructure for IPv6. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:482-487 [Conf]
  72. Fan Zhang, Jianfeng Ma, Sang-Jae Moon
    The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:488-493 [Conf]
  73. Chang-Won Park, Sung Jin Choi, Hee Yong Youn
    A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:494-499 [Conf]
  74. Haibo Tian, Xi Sun, Yumin Wang
    A Virtual Bridge Certificate Authority Model. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:500-507 [Conf]
  75. Jorma Kajava, Reijo Savola, Rauno Varonen
    Weak Signals in Information Security Management. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:508-517 [Conf]
  76. Wu Liu, Haixin Duan, Jianping Wu, Xing Li
    PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:518-525 [Conf]
  77. Mengquan Lin, Qiangmin Wang, Jianhua Li
    Methodology of Quantitative Risk Assessment for Information System Security. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:526-531 [Conf]
  78. Mei-juan Huang, Jian-zhong Zhang, Shu-cui Xie
    A Secure and Efficient (t, n) Threshold Verifiable Multi-secret Sharing Scheme. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:532-537 [Conf]
  79. Chin-Chen Chang, Jung-San Lee
    Improvement on an Optimized Protocol for Mobile Network Authentication and Security. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:538-541 [Conf]
  80. Qian-Mu Li, Man-Wu Xu, Hong Zhang, Fengyu Liu
    Neural Network Based Flow Forecast and Diagnosis. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:542-547 [Conf]
  81. Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori, Cherri M. Pancake
    Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:548-553 [Conf]
  82. Hui-Feng Huang, Chin-Chen Chang
    Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:554-559 [Conf]
  83. Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang
    Topology-Based Macroscopical Response and Control Technology for Network Security Event. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:560-566 [Conf]
  84. Chin-Chen Chang, Chia-Chen Lin, Jun-Bin Yeh
    Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:567-572 [Conf]
  85. Xiaoping Liang, Xiaoyun Wu, Jiwu Huang
    Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:573-580 [Conf]
  86. Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, Ki-Ryong Kwon
    An Image Steganography Using Pixel Characteristics. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:581-588 [Conf]
  87. Konstantinos Papapanagiotou, Emmanouel Kellinis, Giannis F. Marias, Panagiotis Georgiadis
    Alternatives for Multimedia Messaging System Steganography. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:589-596 [Conf]
  88. Shuai Wan, Yilin Chang, Fuzheng Yang
    Error Concealment for Video Transmission Based on Watermarking. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:597-604 [Conf]
  89. Tran Minh Triet, Duong Anh Duc
    Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:605-610 [Conf]
  90. Bin Liu, Zhitang Li, Zhanchun Li
    An Image Hiding Algorithm Based on Bit Plane. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:611-616 [Conf]
  91. Xiangyang Wang, Hong Zhao
    A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:617-622 [Conf]
  92. Hyun-Mi Kim, Ik-Hwan Cho, A-Young Cho, Dong-Seok Jeong
    Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in MPEG-2 Video. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:623-628 [Conf]
  93. Zhiqiang Yao, Liping Chen, Rihong Pan, Boxian Zou, Licong Chen
    Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:629-634 [Conf]
  94. Daesung Moon, Taehae Kim, Seunghwan Jung, Yongwha Chung, Kiyoung Moon, Dosung Ahn, Sang-Kyoon Kim
    Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:635-642 [Conf]
  95. Seong-Whan Kim, HyunSung Sung
    An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component Analysis. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:643-648 [Conf]
  96. Chen Xu, Weiqiang Zhang, Francis R. Austin
    A Digital Watermarking Technique Based on Wavelet Packages. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:649-654 [Conf]
  97. Long Ma, Changjun Li, Shuni Song
    A Spectral Images Digital Watermarking Algorithm. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:655-660 [Conf]
  98. Niladri B. Puhan, Anthony T. S. Ho
    Restoration in Secure Text Document Image Authentication Using Erasable Watermarks. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:661-668 [Conf]
  99. Won-Hyuck Choi, Doo-Hyun Kim, Kwang-Jae Lee, Jung-Sun Kim
    The Study of RED Algorithm Used Multicast Router Based Buffer Management. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:669-678 [Conf]
  100. Lei Cao, Jian Cao, Minglu Li
    Genetic Algorithm Utilized in Cost-Reduction Driven Web Service Selection. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:679-686 [Conf]
  101. Xiaohua Luo, Kougen Zheng, Zhaohui Wu, Yunhe Pan
    MacroOS: A Pervasive Computing Platform Supporting Context Awareness and Context Management. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:687-694 [Conf]
  102. Qin Liu, Chanle Wu
    A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:695-702 [Conf]
  103. Shaohe Lv, Jianping Yin, Zhiping Cai, Chi Liu
    On a Novel Methodology for Estimating Available Bandwidth Along Network Paths. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:703-710 [Conf]
  104. Liyuan Zhao, Keqin Liu, Jun Zheng
    A New AQM Algorithm for Enhancing Internet Capability Against Unresponsive Flows. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:711-718 [Conf]
  105. Terry C. House
    Client Server Access: Wired vs. Wireless LEO Satellite-ATM Connectivity; A (MS-Ro-BAC) Experiment. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:719-724 [Conf]
  106. Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik
    An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to XML Schema. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:725-730 [Conf]
  107. Shuning Cui, Boqin Feng
    A Fuzzy Integral Method to Merge Search Engine Results on Web. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:731-736 [Conf]
  108. Sungjune Hong, Sunyoung Han
    The Next Generation PARLAY X with QoS/QoE. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:737-742 [Conf]
  109. Seong-Woo Kim, Young-Chul Jung, Young-Tak Kim
    A Design of Platform for QoS-Guaranteed Multimedia Services Provisioning on IP-Based Convergence Network. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:743-748 [Conf]
  110. Tai Sik Lee, Dong Wook Lee, Jeong Hyun Kim
    Introduction of Knowledge Management System for Technical Support in Construction Industries. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:749-756 [Conf]
  111. Qiuhua Zheng, Yuntao Qian
    An Event Correlation Approach Based on the Combination of IHU and Codebook. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:757-763 [Conf]
  112. Bicheng Li, Hujun Yin
    Face Recognition Based on Support Vector Machine Fusion and Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:764-771 [Conf]
  113. Jun Zhou, Guangda Su, Yafeng Deng, Kai Meng, Congcong Li
    A Dynamic Face and Fingerprint Fusion System for Identity Authentication. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:772-779 [Conf]
  114. Kyu B. Doh, Jungho Ohn, Ting-C Poon
    Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:780-787 [Conf]
  115. Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling
    Binarized Revocable Biometrics in Face Recognition. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:788-795 [Conf]
  116. Junping Wang, Yue Hao
    Short Critical Area Computational Method Using Mathematical Morphology. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:796-803 [Conf]
  117. Yong Zhou, Xiaofeng Hu, Qingtai Ye
    A Robust Lane Detection Approach Based on MAP Estimate and Particle Swarm Optimization. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:804-811 [Conf]
  118. Fuhai Li, Jinwen Ma, Dezhi Huang
    MFCC and SVM Based Recognition of Chinese Vowels. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:812-819 [Conf]
  119. Zhe-Ming Lu, Hui Pei, Hans Burkhardt
    A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification in the DCT Domain. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:820-825 [Conf]
  120. Ji Bai, Lizhuang Ma, Li Yao, Tingting Yao, Ying Zhang
    Removing of Metal Highlight Spots Based on Total Variation Inpainting with Multi-sources-flashing. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:826-831 [Conf]
  121. Kyoung-Mi Lee
    Component-Based Online Learning for Face Detection and Verification. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:832-837 [Conf]
  122. Wenbing Fan, Jing Chen, Jina Zhen
    SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image Compression. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:838-844 [Conf]
  123. Han-Suh Koo, Chang-Sung Jeong
    Modified EZW Coding for Stereo Residual. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:845-850 [Conf]
  124. Xuemei Xie, Guangming Shi, Xuyang Chen
    Optimal Prototype Filters for Near-Perfect-Reconstruction Cosine-Modulated Filter Banks. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:851-856 [Conf]
  125. Chan Lim, Hyun Soo Kang, Tae-Yong Kim
    Fast Motion Estimation Scheme for Real Time Multimedia Streaming with H.264. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:857-862 [Conf]
  126. Guiguang Ding, Qionghai Dai, Wenli Xu
    Motion-Compensated 3D Wavelet Video Coding Based on Adaptive Temporal Lifting Filter Implementation. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:863-868 [Conf]
  127. Shin-Hyoung Kim, Jong-Whan Jang, Seung Phil Lee, Jae-Ho Choi 0002
    Accurate Contouring Technique for Object Boundary Extraction in Stereoscopic Imageries. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:869-874 [Conf]
  128. Yunshu Hou, Yanning Zhang, Rongchun Zhao
    Robust Object Tracking Based on Uncertainty Factorization Subspace Constraints Optical Flow. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:875-880 [Conf]
  129. Benlian Xu, Zhiquan Wang
    Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:881-886 [Conf]
  130. Weixing Wang
    Image Classification and Delineation of Fragments. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:887-892 [Conf]
  131. Guoyou Wang, Wentao Wang
    A Novel Wavelet Image Coding Based on Non-uniform Scalar Quantization. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:893-898 [Conf]
  132. Bai-Tao Zhou, Won Nah, Kang Woong Lee, Joong-Hwan Baek
    A General Image Based Nematode Identification System Design. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:899-904 [Conf]
  133. Ling Zhang, Xianda Zhang
    A Novel SVD-Based RLS Blind Adaptive Multiuser Detector for CDMA Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:905-910 [Conf]
  134. Jung-Youp Suk, Gun Woo Lee, Kuhn-Il Lee
    New Electronic Digital Image Stabilization Algorithm in Wavelet Transform Domain. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:911-916 [Conf]
  135. Z. W. Liao, S. X. Hu, T. Z. Huang
    Line Segments and Dominate Points Detection Based on Hough Transform. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:917-922 [Conf]
  136. Jian Zhuang, Haifeng Du, Jinhua Zhang, Sun'an Wang
    The Study of the Auto Color Image Segmentation. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:923-928 [Conf]
  137. Vivek Maik, Jeongho Shin, Joon Ki Paik
    Regularized Image Restoration by Means of Fusion for Digital Auto Focusing. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:929-934 [Conf]
  138. Gangyi Jiang, Liangzhong Fan, Mei Yu, Rangding Wang, Xien Ye, Yong-Deak Kim
    Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points Detection. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:935-940 [Conf]
  139. Fasong Wang, Hongwei Li, Rui Li, Shaoquan Yu
    Non-parametric ICA Algorithm for Hybrid Sources Based on GKNN Estimation. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:941-946 [Conf]
  140. Kyu-Yeol Chae, Won-Pyo Dong, Chang-Sung Jeong
    SUSAN Window Based Cost Calculation for Fast Stereo Matching. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:947-952 [Conf]
  141. Zhiliang Xu, Shengli Xie, Youjun Xiang
    An Efficient Adaptive De-blocking Algorithm. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:953-958 [Conf]
  142. Lei Wang, Beiji Zou, Jiaguang Sun
    Facial Features Location by Analytic Boosted Cascade Detector. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:959-964 [Conf]
  143. Zhilin Feng, Jianwei Yin, Zhaoyang He, Wuheng Zuo, Jinxiang Dong
    New Approach for Segmentation and Pattern Recognition of Jacquard Images. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:965-970 [Conf]
  144. Jinwu Wei, Jiangxing Wu
    Nonstationarity of Network Traffic Within Multi-scale Burstiness Constraint. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:971-976 [Conf]
  145. Li Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan, Guanjun Bao
    Principle of Image Encrypting Algorithm Based on Magic Cube Transformation. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:977-982 [Conf]
  146. DongDong Zhang, Wenjun Zhang, Li Song, Hongkai Xiong
    A Study on Motion Prediction and Coding for In-Band Motion Compensated Temporal Filtering. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:983-988 [Conf]
  147. Qing Xu, Shiqiang Bao, Rui Zhang, Ruijuan Hu, Mateu Sbert
    Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis Entropy. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:989-994 [Conf]
  148. Zaiqiang Liu, Dengguo Feng
    Incremental Fuzzy Decision Tree-Based Network Forensic System. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:995-1002 [Conf]
  149. Youqing Wang, Donghua Zhou
    Robust Reliable Control for a Class of Fuzzy Dynamic Systems with Time-Varying Delay. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1003-1010 [Conf]
  150. Hong Yan Yi, Beatriz de la Iglesia, Victor J. Rayward-Smith
    Using Concept Taxonomies for Effective Tree Induction. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1011-1016 [Conf]
  151. Jingtao Li, Yinan Jing, Peng Fu, Gendu Zhang, Yongqiang Chen
    A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1017-1024 [Conf]
  152. Kyu-Sik Park, Youn-Ho Cho, Sang-Hun Oh
    Automatic Classification of Korean Traditional Music Using Robust Multi-feature Clustering. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1025-1029 [Conf]
  153. Changjie Wang, Ho-fung Leung
    A Private and Efficient Mobile Payment Protocol. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1030-1035 [Conf]
  154. Tianjie Cao, Dongdai Lin, Rui Xue
    Universal Designated-Verifier Proxy Blind Signatures for E-Commerce. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1036-1041 [Conf]
  155. Ulvi Dagdelen, Aytekin Bagis, Dervis Karaboga
    An Efficient Control Method for Elevator Group Control System. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1042-1047 [Conf]
  156. Qijian Xu, Naitong Zhang, Jie Zhang, Yu Sun
    Next Generation Military Communication Systems Architecture. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1048-1053 [Conf]
  157. Antti Tikkanen, Teemupekka Virtanen
    Early Warning for Network Worms. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1054-1059 [Conf]
  158. Xinhua You, Bin Fang, Xinge You, Zhenyu He, Dan Zhang, Yuan Yan Tang
    Skeleton Representation of Character Based on Multiscale Approach. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1060-1067 [Conf]
  159. Wenming Cao, Wanfang Chai, Shoujue Wang
    Channel Equalization Based on Two Weights Neural Network. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1068-1073 [Conf]
  160. Pawalai Kraipeerapun, Chun Che Fung, Warick Brown
    Assessment of Uncertainty in Mineral Prospectivity Prediction Using Interval Neutrosophic Set. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1074-1079 [Conf]
  161. Qiang Lei, Zhengtao Jiang, Yumin Wang
    Ring-Based Anonymous Fingerprinting Scheme. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1080-1085 [Conf]
  162. Jae-Min Seol, Seong-Whan Kim
    Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1086-1091 [Conf]
  163. Xixiang Lv, Bo Yang
    Broadcast Encryption Using Identity-Based Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1092-1097 [Conf]
  164. Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do Jin, Sung-Jea Ko
    Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1098-1103 [Conf]
  165. Howon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung
    Design and Implementation of Crypto Co-processor and Its Application to Security Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1104-1109 [Conf]
  166. Wenming Cao, Jianqing Li, Shoujue Wang
    Continuous Speech Research Based on HyperSausage Neuron. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1110-1115 [Conf]
  167. Changcai Han, Dongfeng Yuan
    Variable-Rate Channel Coding for Space-Time Coded MIMO System. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1116-1121 [Conf]
  168. Xiang-chu Feng, Yongdong Yang
    A New Watermarking Method Based on DWT. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1122-1126 [Conf]
  169. Daniel Kang, Byeong-Seok Shin
    Efficient Point Rendering Method Using Sequential Level-of-Detail. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1127-1133 [Conf]
  170. Tongqi Zhang, Qingjiang Chen
    Construction of a Class of Compactly Supported Biorthogonal Multiple Vector-Valued Wavelets. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1134-1139 [Conf]
  171. Yoo-Joo Choi, Jeong-Sik Kim, Min-Jeong Kim, Soo-Mi Choi, Myoung-Hee Kim
    Metabolic Visualization and Intelligent Shape Analysis of the Hippocampus. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1140-1148 [Conf]
  172. Kwangsun Ko, Insook Jang, Yong-hyeog Kang, Jinseok Lee, Young Ik Eom
    Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1149-1156 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002