The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Charlie Obimbo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Charlie Obimbo
    A Parallel Algorithm For Determining The Inverse Of A Matrix For Use In Block Cipher Encryption And Decryption. [Citation Graph (0, 0)][DBLP]
    CSC, 2005, pp:164-172 [Conf]
  2. Charlie Obimbo, Nhi Tonnu
    A System That Can Enhance E-Business In The Developing World. [Citation Graph (0, 0)][DBLP]
    CSREA EEE, 2005, pp:68-74 [Conf]
  3. Charlie Obimbo, Rohit Makhijani
    An Online Linking System for Researchers. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2004, pp:455-458 [Conf]
  4. Gary William Grewal, Mike O'Cleirigh, Charlie Obimbo
    Hierarchical Genetic Algorithms Applied to Datapath Synthesis. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2003, pp:994-1002 [Conf]
  5. Gary William Grewal, Ming Xu, Charlie Obimbo
    An Approximate Solution for Steiner Trees in Multicast Routing. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2004, pp:707-711 [Conf]
  6. Anthony Koso, Andrew Turi, Charlie Obimbo
    Embedding Digital Signatures in MP3s. [Citation Graph (0, 0)][DBLP]
    IMSA, 2005, pp:271-274 [Conf]
  7. Ming Xu, Behzad Salami, Charlie Obimbo
    How to Protect Personal Information against Keyloggers. [Citation Graph (0, 0)][DBLP]
    IMSA, 2005, pp:275-280 [Conf]
  8. Charlie Obimbo, Stephen Doxsee
    The Threat of a Deterministic Polynomial Time Algorithm for Primality Testing in Applied Cryptography. [Citation Graph (0, 0)][DBLP]
    MSV/AMCS, 2004, pp:423-426 [Conf]
  9. Charlie Obimbo, Liliana M. Arboleda C., Yunfeng Chen
    A Watchdog Enhancement to IDS in MANET. [Citation Graph (0, 0)][DBLP]
    Wireless and Optical Communications, 2006, pp:- [Conf]
  10. Charlie Obimbo, JingBo Ni
    A grey-level image watermarking method based on block DCT and statistic correlation adjustment. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:22-27 [Conf]
  11. Behzad Salami, Charlie Obimbo
    A multi-bitwatermark generation algorithm with properties of error correction. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:44-49 [Conf]
  12. Charlie Obimbo, Behzad Salami
    A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2007, v:39, n:2, pp:113-130 [Journal]

  13. An Adaptive Coding Algorithm for Secret Transmission of Information. [Citation Graph (, )][DBLP]


  14. An Intrusion Detection System for Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  15. Approximating the Vertex Cover Problem by Selection of Nodes of Maximum Degrees for use in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  16. Using the HC for Shape Representation and Description. [Citation Graph (, )][DBLP]


  17. A Watermark Generation Algorithm Using The Mersenne Twister. [Citation Graph (, )][DBLP]


  18. Near-linear wirelength estimation for FPGA placement. [Citation Graph (, )][DBLP]


Search in 0.013secs, Finished in 0.014secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002