Utility computing : reality and beyond
|
2008 |
Ivanov, Ivan I. |
A hybrid data mining approach for credit card usage behavior analysis
|
2008 |
Tsai, Chieh-Yuan |
An adaptive knowledge-based approach for detecting fraud across different e-government domains
|
2008 |
|
IPSec database query acceleration
|
2008 |
Ferrante, Alberto |
Detection of spoofed MAC adresses in 802.11 wireless networks
|
2008 |
Tao, Kai |
K2 stream cipher
|
2008 |
Kiyomoto, Shinsaku |
Knwoledge Engineering aspects of affective bi-modal educational applications
|
2008 |
Alepis, Efthymios |
Bit and power allocation strategies for OFDM systems over time-varying channels
|
2008 |
Gao, Xiang |
Mobile applications to a pervasive world
|
2008 |
Oliveira Coelho, Hiata Anderson de |
A novel grid-based micropayment system for heterogeneous multi-party accounting
|
2008 |
Abdelkader, Manel |
Bidding agents that perpetrate auction fraud
|
2008 |
Trevathan, Jarrod |
Critical success factors of internet shopping : the case of Japan
|
2008 |
Atchariyachanvanich, Kanokwan |
Score equalization in SVM multimodal fusion for person recognition
|
2008 |
Ejarque, Pascual |
Reliable intersection computation within malicious environments
|
2008 |
Böttcher, Stefan |
Facial expression synthesis and analysis
|
2008 |
Wang, Hao |
Timing to block scanning malwares by using combinatorics proliferation model
|
2008 |
Omote, Kazumasa |
Remote algorithmic complexity attacks against randomized hash tables
|
2008 |
Bar-Josef, Noa |
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
|
2008 |
|
Multi-sequence H.264/AVC rate control based on the linear model
|
2008 |
Pastuszak, Grzegorz |
Non parametric stochastic expectation maximization for data clustering
|
2008 |
|