High Capacity Steganographic Method Based Upon JPEG. [Citation Graph (, )][DBLP]
Image Steganography and Chrominance Components. [Citation Graph (, )][DBLP]
JPEG Steganography: A Performance Evaluation of Quantization Tables. [Citation Graph (, )][DBLP]
Android, Java ME and Windows Mobile Interplay: The Case of a Context-Aware Meeting Room. [Citation Graph (, )][DBLP]
The Criteria for Effective Electronic Negotiation Systems. [Citation Graph (, )][DBLP]
Human Computer Interaction with a PIM Application: Merging Activity, Location and Social Setting into Context. [Citation Graph (, )][DBLP]
The Effects of Prior Knowledge on the Use of Adaptive Hypermedia Learning Systems. [Citation Graph (, )][DBLP]
The Persuasive Effects from Web 2.0 Marketing: A Case Study Investigating the Persuasive Effect from an Online Design Competition. [Citation Graph (, )][DBLP]
Multi-dimensional Moderation in Online Communities: Experiences with Three Norwegian Sites. [Citation Graph (, )][DBLP]
The Perceptual Influence of Multimedia Delay and Jitter. [Citation Graph (, )][DBLP]
Synchronisation of olfactory-enhanced multimedia: Perspectives from an empirical study. [Citation Graph (, )][DBLP]
Olfaction-enhanced multimedia: Bad for information recall? [Citation Graph (, )][DBLP]
An eye-tracking-based adaptive multimedia streaming scheme. [Citation Graph (, )][DBLP]
A Performance Evaluation of Security Mechanisms for Web Services. [Citation Graph (, )][DBLP]
Android vs Windows Mobile vs Java ME: a comparative study of mobile development environments. [Citation Graph (, )][DBLP]
Trust model for certificate revocation in ad hoc networks. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP