Bit and power allocation strategies for OFDM systems over time-varying channels
|
2008 |
Gao, Xiang |
Mobile applications to a pervasive world
|
2008 |
Oliveira Coelho, Hiata Anderson de |
A novel grid-based micropayment system for heterogeneous multi-party accounting
|
2008 |
Abdelkader, Manel |
Bidding agents that perpetrate auction fraud
|
2008 |
Trevathan, Jarrod |
Critical success factors of internet shopping : the case of Japan
|
2008 |
Atchariyachanvanich, Kanokwan |
Score equalization in SVM multimodal fusion for person recognition
|
2008 |
Ejarque, Pascual |
Reliable intersection computation within malicious environments
|
2008 |
Böttcher, Stefan |
Facial expression synthesis and analysis
|
2008 |
Wang, Hao |
Pragmatic computing : a semiotic perspective to web services
|
2008 |
Liu, Kecheng |
A platform for mobile service provisioning based on SOA-integration
|
2008 |
Decker, Michael |
Securing biometric templates where similarity is measured with set intersection
|
2008 |
Socek, Daniel |
Securing real-time sessions in an IMS-based architecture
|
2008 |
|
A security hardening language based on aspect-orientation
|
2008 |
Mourad, Azzam |
Mapping phonetic features for voice-driven sound synthesis
|
2008 |
Janer, Jordi |
The MiSPOT system : personalized publicity and marketing over interactive digital TV
|
2008 |
|
Utility computing : reality and beyond
|
2008 |
Ivanov, Ivan I. |
A hybrid data mining approach for credit card usage behavior analysis
|
2008 |
Tsai, Chieh-Yuan |
An adaptive knowledge-based approach for detecting fraud across different e-government domains
|
2008 |
|
IPSec database query acceleration
|
2008 |
Ferrante, Alberto |
Detection of spoofed MAC adresses in 802.11 wireless networks
|
2008 |
Tao, Kai |