Posts

old
A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY

A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOG...

A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY

old
AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

AMPLE: An Adaptive Traffic Engineering System Based on ...

AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

old
Robust Face-Name Graph Matching for Movie Character Identification

Robust Face-Name Graph Matching for Movie Character Ide...

Robust Face-Name Graph Matching for Movie Character Identification

old
Low-Complexity Compression Method for Hyper spectral Images Based on Distributed Source Coding

Low-Complexity Compression Method for Hyper spectral Im...

Low-Complexity Compression Method for Hyper spectral Images Based on Distributed...

old
Balancing the Trade-Offs between Query Delay and Data Availability in MANETs

Balancing the Trade-Offs between Query Delay and Data A...

Balancing the Trade-Offs between Query Delay and Data Availability in MANETs

old
Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems

Efficient Multi-dimensional Fuzzy Search for Personal I...

Efficient Multi-dimensional Fuzzy Search for Personal Information Management Sys...

old
Robustness of Offline Signature Verification Based on Gray Level Features

Robustness of Offline Signature Verification Based on G...

Robustness of Offline Signature Verification Based on Gray Level Features

old
Controllable SecureWatermarking Technique for Tradeoff Between Robustness and Security

Controllable SecureWatermarking Technique for Tradeoff ...

Controllable SecureWatermarking Technique for Tradeoff Between Robustness and Se...

old
A Discriminative Model of Motion and Cross Ratio for View-Invariant Action Recognition

A Discriminative Model of Motion and Cross Ratio for Vi...

A Discriminative Model of Motion and Cross Ratio for View-Invariant Action Recog...

old
Towards Accurate Mobile Sensor Network Localization in Noisy Environments

Towards Accurate Mobile Sensor Network Localization in ...

Towards Accurate Mobile Sensor Network Localization in Noisy Environments

old
Persuasive Cued Click-Points: Design

Persuasive Cued Click-Points: Design

Persuasive Cued Click-Points: Design

old
Implementation

Implementation

Implementation

old
and Evaluation of a Knowledge-Based Authentication Mechanism

and Evaluation of a Knowledge-Based Authentication Mech...

and Evaluation of a Knowledge-Based Authentication Mechanism

old
Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning

Using Linked Data to Annotate and Search Educational Vi...

Using Linked Data to Annotate and Search Educational Video Resources for Support...

old
Multibiometric Cryptosystems Based on Feature-Level Fusion

Multibiometric Cryptosystems Based on Feature-Level Fusion

Multibiometric Cryptosystems Based on Feature-Level Fusion

old
Ranking Model Adaptation for Domain-Specific Search

Ranking Model Adaptation for Domain-Specific Search

Ranking Model Adaptation for Domain-Specific Search