IAS C

354 papers

YearTitle / Authors
20092-Level-Wavelet-Based License Plate Edge Detection.
Ming-Kan Wu, Jing-Siang Wei, Hao-Chung Shih, Chian C. Ho
2009A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation.
Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai
2009A CELP-Speech Information Hiding Algorithm Based on Vector Quantization.
Ji-Xin Liu, Zhe-Ming Lu, Hao Luo
2009A Comparative Statistical Analysis of Pseudorandom Bit Sequences.
Rashidah Kadir, Mohd Aizaini Maarof
2009A Database Protection System Aiming at SQL Attack.
Liwu Deng, Ruzhi Xu, Lizheng Jiang, Guangjuan Lv
2009A Deep Copy Protection Framework for Electronic Devices within Home.
Yang Zhan, Haibo Tian, Qingqi Pei, Yueyu Zhang, Yumin Wang, Weidong Zhang
2009A Digital Certificate Application Scheme in Content Protection System for High Definition Digital Interface.
Kefeng Fan, Subing Zhang, Wei Mo
2009A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform.
Xiang He, Jianjun Liu
2009A Dynamic Graph Watermark Scheme of Tamper Resistance.
Xiaojiang Chen, Dingyi Fang, Jingbo Shen, Feng Chen, Wenbo Wang, Lu He
2009A Dynamic Layering Scheme of Multicast Key Management.
Fan Yang, Xiaoping Li, Qingkuan Dong, Yanming Liu
2009A Fast Correlation Attack via Parallel Computing.
Qiong Liu, Yupu Hu
2009A Fragile Software Watermarking for Tamper-Proof.
Changle Zhang, Hong Peng, Xianzhong Long, Zheng Pan, Ying Wu
2009A Frequent-Domain VideoTranscoder with Spatial Downscaling for H.264/AVC.
Bo Wang, Dichen Liu
2009A Generalization of de Weger's Method.
Chien-Yuan Chen, Chih-Cheng Hsueh, Yu-Feng Lin
2009A High Embedding Efficiency Steganography Scheme for Wet Paper Codes.
Zhao-Xia Yin, Chin-Chen Chang, Yan-Ping Zhang
2009A High Quality Reversible Data Hiding Method Using Interpolation Technique.
Chyuan-Huei Thomas Yang, Chun-Hao Hsu
2009A High-efficiency Data Distribution Algorithm in Distributed Storage.
Xiaoyuan Yang, Zhen Liu, Wei Zhang, Dun-Tao Guo
2009A Joint Multiscale Algorithm with Auto-adapted Threshold for Image Denoising.
Jin He, Yinpei Sun, Ying Luo, Qun Zhang
2009A Low-cost RFID Authentication Protocol with Location Privacy Protection.
Yu-Yi Chen, Jun-Chao Lu, Shin-I Chen, Jinn-ke Jan
2009A Method for Accessing Trusted Services Based on Service-Oriented Architecture.
Xin Yu, Yu Bai
2009A Model of Intrusion Prevention Base on Immune.
Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai
2009A Modified Feature Based Image Watermarking Scheme in NSCT Domain.
Liu Yang, Baolong Guo, Jianmin Lv
2009A Modified Run-length Image Data Hiding for High Embedding Capacity.
Rey-Sern Lin, Shang-Wen Hu
2009A Multi-view Nonlinear Active Shape Model Based on 3D Transformation Shape Search.
Faling Yi, Wei Xiong, Zhanpeng Huang, Jie Zhao
2009A Name Recommendation Photo Album Using Probability Neural Network.
Ding-Hrong Chen, Shiang-En Tang
2009A New Abuse-Free Fair Electronic Payment Protocol.
Kai Fan, Yue Wang, Hui Li
2009A New Accelerated RC4 Scheme Using "Ultra Gridsec" and "HIMAN" and use this Scheme to Secure "HIMAN" Data.
Hisham A. Kholidy, Khaled Alghathbar
2009A New Adaptive Image Denoising Method Combining the Nonsubsampled Contourlet Transform and Total Variation.
Xiaoyue Wu, Baolong Guo, Shengli Qu, Zhuo Wang
2009A New Algorithm for Outlier Detection Based on Offset.
Yue Zhang, Jie Liu, Bo Song
2009A New Authenticated Key Agreement Protocol for Wireless Mobile Networks.
Shin-Jia Hwang, Ming-Jhang Chai
2009A New Conic Curve Digital Signature Scheme.
Xiang Can, You Lin
2009A New Efficient and Strongly Secure Authenticated Key Exchange Protocol.
Qingfeng Cheng, Guangguo Han, Chuangui Ma
2009A New Feature Selection Method for Malcodes Detection.
Xiaokang Zhang, Jianmei Shuai
2009A New Fingerprint Sequences Matching Algorithm for Content-Based Copy Detection.
Rongxian Nie, Guiguang Ding, Jianmin Wang, Li Zhang
2009A New Histogram Based Image Watermarking Scheme Resisting Geometric Attacks.
Xin-Wei Li, Bao-Long Guo, Lei-Da Li, Hong-Xin Shen
2009A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
Yulong Shen, Qijian Xu, Zuoshun Wu, Hao Yin, Jianfeng Ma
2009A New Image Restoration Algorithm Based on Variational Derivative.
Wenjuan Zhang, Weibin Zhang
2009A New Interacting Multiple Model Algorithm Based on the Unscented Particle Filter.
Xiaolong Deng, Pingfang Zhou
2009A New JPEG Resistant Color Image Watermarking Algorithm Based on Quantization Index Modulation.
Jie Nie, Zhiqiang Wei, Zhen Li
2009A New Knapsack Public-Key Cryptosystem.
Weidong Zhang, Baocang Wang, Yupu Hu
2009A New Multi-bank E-cash Protocol with Anonymity Control.
Lingling Wang
2009A New Multiple-Objects Tracking Method with Particle Filter.
Long Chen, Baolong Guo, Wei Sun
2009A New Scheme for Multisensor Image Fusion System.
Liu Weiguang, Wang Wenqi, Cui Jiangtao
2009A New Scheme to Privacy-Preserving Collaborative Data Mining.
Jianming Zhu
2009A New Source Address Validation Scheme Based on IBS.
Ningning Lu, Huachun Zhou, Hongke Zhang
2009A Novel Approach for Audio Watermarking.
Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Akram M. Zeki, Pritheega Magalingam
2009A Novel Biometric-Based Authentication Scheme with Privacy Protection.
Huixian Li, Liaojun Pang
2009A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value.
Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin
2009A Novel Method for Plane Array Infrared Image to Detect Point Target.
Che Hong, Sun Longhe
2009A Novel Micropayment Scheme with Complete Anonymity.
Xin Zhao, Yuqin Lv, Wenxin He
2009A Novel Multiple Description Coding Frame Based on Reordered DCT Coefficients and SPIHT Algorithm.
Lin-Lin Tang, Zhe-Ming Lu, Fa-Xin Yu
2009A Novel Video Shot Segmentation Based on Textural Features.
Yin Wang, Xiangming Wen, Xinqi Lin, Peizhou He, Wei Zheng
2009A Parity Check Node Synchronization Based Method for Solving Phase Ambiguity Problem in DVB-S Systems.
Jielin Fu, Yongjun Tang
2009A Performance Evaluation of Security Mechanisms for Web Services.
Bachar Alrouh, Gheorghita Ghinea
2009A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks.
Iuon-Chang Lin, Shu-Yan Huang
2009A Provably Secure Certificateless Blind Signature Scheme.
Xiaoyuan Yang, Zhongyin Liang, Ping Wei, Junwei Shen
2009A RST Invariant Watermarking Scheme Utilizing Support Vector Machine and Image Moments for Synchronization.
Jianzhen Wu
2009A Rapid Algorithm and its Implementation for Modular Inversion.
Baiwen Fu
2009A Real-Time Selective Video Encryption Using Context-Key Control.
Hung-Min Sun, Muh-Chyi Leu
2009A Resistant Secret Sharing Scheme.
Chin-Chen Chang, Yen-Chang Chen, Chia-Chen Lin
2009A Robust Vehicle Tracking Approach Using Mean Shift Procedure.
Huan Shen, Shun Ming Li, Jian Guo Mao, Fang Chao Bo, Fang Pei Li, Hua Peng Zhou
2009A Robust Watermark Algorithm for JPEG2000 Images.
Hai-ying Gao, Guo-qiang Liu, Xu Li, Yin Xu
2009A Role and Activity Based Access Control Model for University Identity and Access Management System.
Shuliang Zheng, Doingxing Jiang, Qixin Liu
2009A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow.
Mengbo Hou, Qiuliang Xu
2009A Study on the Algorithm Based on Image Color Correlation Mining.
Yongyue Chen, Huosong Xia
2009A Support Vector Machines Security Assessment Method Based on Group Decision-Marking for Electric Power Information System.
Xiaorong Cheng, Yan Wei, Xin Geng
2009A System for Detecting Unusual Sounds from Sound Environment Observed by Microphone Arrays.
Mitsuru Kawamoto, Futoshi Asano, Koichi Kurumatani, Yingbo Hua
2009A Two-Description Distributed Video Coding.
Anhong Wang, Yao Zhao, Zhihong Li
2009A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic Diffusion for Image Denoising.
Weibin Zhang, Wenjuan Zhang
2009A Watermarking Scheme Based on Two-dimensional Wavelet Filter Parametrization.
Guosheng Cheng, Jianwei Yang
2009Access Log Generator for Analyzing Malicious Website Browsing Behaviors.
Chu-Hsing Lin, Jung-Chun Liu, Ching-Ru Chen
2009Acoustic-Based Security System: Towards Robust Understanding of Emergency Shout.
Hiroaki Nanjo, Takanobu Nishiura, Hiroshi Kawano
2009Action-Based Access Control for Web Services.
Fenghua Li, Wei Wang, Jianfeng Ma, Haoxin Su
2009Adaptive Spatially Postprocessing Technique to Remove Blocking Artifacts for DCT Coded Image.
Jin Wang, Heechang Kim, Jongho Kim, Jechang Jeong
2009Adaptive-Push Peer-to-Peer Video Streaming System Based on Dynamic Unstructured Topology.
Xiaodong Shen, Guiguang Ding, Yizheng Chen, Jianmin Wang
2009Algebraic Attack to SMS4 and the Comparison with AES.
Wen Ji, Lei Hu, Haiwen Ou
2009An Accurate Image Juggling Authentication Algorithm.
Jianquan Xie, Qing Xie, Chunhua Yang
2009An Active Defense Model and Framework of Insider Threats Detection and Sense.
Hongbin Zhang, Jianfeng Ma, Yinchuan Wang, Qingqi Pei
2009An Adaptable Threshold Decision Method.
Meng-Hsiun Tsai, Ming-Hung Wang, Ting-Yuan Chang, Pei-Yan Pai, Yung-Kuan Chan
2009An Adaptive Digital Watermarking Algorithm Based on Balanced Multi-wavelet.
Ming-Xiang Zang, Na Zhang, Jian-Guo Jiang
2009An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems.
Xian-Bo He, Li Yang, Xian-Hua Zeng, Gang-yuan Zhang, Xing-qiang Zhao
2009An Anti-attack Watermarking Based on Synonym Substitution for Chinese Text.
Lu He, Jianbin Lin, Tianzhi Li, Dingyi Fang
2009An Approach to Checking SOC Timing Safety.
Zhenjun Du, Rong Chen
2009An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations.
Tien-Chin Wang, Shu-Chen Peng, Shu-Chen Hsu, Jui-Fang Chang
2009An Attack Model Based on Both-Branch Fuzzy Logic and Fuzzy Petri Net.
Qiuqin Lu, Guangqiu Huang
2009An Audio Watermarking Method of Resistance Statistics Attack Based on Psychoacoustic Model.
Xiao-li Liu, Shuifa Sun, Jian-Wei Zhu, Ming Jiang, Dan-gui Xie
2009An Authenticating Algorithm with Multi-compression Compatible in DCT Domain.
Xiaoyuan Yang, Yao Guo, Ke Niu, Xiang Wu
2009An Authentication Protocol Applied to RFID Security Systems.
Xiaoqing Gong, Yi Wang, Hui Li, Jian He
2009An Automated Mechanism of Security Test on Network Protocols.
Yahui Yang, Yunfei Chen, Min Xia, Juan Ma
2009An Eco-Defending Architecture for Network Security Based on Immuninty and Mobile Agents.
Tongrang Fan, Yan Sun, Yongbin Zhao
2009An Effective Lossless Hiding Technique Based on Reversible Contrast Mapping and Histogram Embedding Methods.
Tzu-Chuen Lu, Ying-Hsuan Huang
2009An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks.
Chen Chen, Li Hui, Qingqi Pei, Ning Lv, Qingquan Peng
2009An Effective Texture Spectrum Descriptor.
Xiaosheng Wu, Junding Sun
2009An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks.
Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang
2009An Efficient Hierarchical Group Key Management Scheme Based on Orthogonal Vectors.
Jing Wang, Xiaola Lin
2009An Enhanced Block Mode Selection Method for Surveillance Video Communication.
Jie Jiang, Wei Mo, Jianmin Lv
2009An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards.
Chun-Ta Li
2009An Extensible and Virtualization-Compatible IDS Management Architecture.
Sebastian Roschke, Feng Cheng, Christoph Meinel
2009An Identification Method for Transient Capacitive Current of Distribution Network by ICMAC.
Jianwen Zhao, Yuanbin Hou
2009An Identity-Based Authentication Model for Mobile Agent.
Yike Yu, Xuefeng Zheng, Mingde Zhang, Qingguo Zhang
2009An Improved Fusion Algorithm of the Weighted Features and its Application in Image Retrieval.
Mei Wang, Li Wang
2009An Improved Genetic Algorithm for Power Grid.
Youchan Zhu, Xueying Guo, Jing Li
2009An Improved Image Encryption Scheme Based on Line Maps.
Juan Li, Yong Feng, Xuqiang Yang
2009An Improved Iris Recognition Method Based on Gray Surface Matching.
Dong-Mei Wu, Jiang-Nan Wang
2009An Improved SPECK Image Coding Algorithm.
Baojun Han, Yan Liu
2009An Improved Scheme of Single Sign-on Protocol.
Yang Jian
2009An Improved Weighted-Feature Clustering Algorithm for K-anonymity.
Lijian Lu, Xiaojun Ye
2009An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad Hoc Networks.
Jian Liu, Fangmin Li
2009An Improving Technique of Color Histogram in Segmentation-based Image Retrieval.
Zhenhua Zhang, Wenhui Li, Bo Li
2009An Intrusion Detection System for Network Storage Based on System Calls.
Li-zhong Geng, Hui-bo Jia
2009An Optimal Blind Signature Padding with Message Recovery.
Jingran Wang, Haifeng Qian
2009Analysis and Evaluation of Contrast Enhancement Methods in Digital Images.
Shen-Chuan Tai, Yi-Ying Chang, Ting-Chou Tsai, Li-Man Liao
2009Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel.
Ying Sun, Chunxiang Xu, Qi Xia, Yong Yu
2009Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network.
Qunting Yang, Tiegang Gao, Li Fan, Qiaolun Gu
2009Analysis the Properties of TLS Based on Temporal Logic of Knowledge.
Chao Lv, Hui Li, Jianfeng Ma
2009Anomalous Payload Detection System Using Analysis of Frequent Sequential Pattern.
Jun Ma, Guanzhong Dai, Jing Zhou
2009Anti-protocol Attacks Digital Watermarking Based on Media-Hash and SVD.
Jing-pei Wang, Shuifa Sun, Ming Jiang, Dan-gui Xie, Bang Jun Lei
2009Application and Research of Mobile E-commerce Security Based on WPKI.
Feng Tian, Xiao-bing Han, Ying Wei
2009Application of Averaged Learning Subspace Method in MRI Classification.
Chuin-Mu Wang, Jau-An Chen, Jui-Hsing Chu
2009Application of Bloom Filter for GTP Stateful Inspection in Network Processor.
Zhenyu Liu, Weijun Li, Yue Lai
2009Application of Particle Swarm Optimization in Fussy Neural Networks.
Qingnian Wang, Kun Yan, Xiaofeng Wan, Meiling Yuan
2009Application of Rough Set Theory in Coal Gangue Image Process.
Xian-Min Ma, Che Liang
2009Application of the Fuzzy Entropy Weight in Risk Assessment of the Engineering Project.
Xuyan Wu, Huiling Gu, Xujie Hu, Yuhong Dong
2009Appraisal Model of MIS in Enterprises Based on the Unascertained Measurement.
Xuyan Wu, Huiling Gu, Xujie Hu, Yuhong Dong
2009Assessment of Color Video Quality with Singular Value Decomposition of Complex Matrix.
Fuqiang Zhang, Junli Li, Gang Chen, Jiaju Man
2009Attacks on a Universal Designated Verifier Signature Scheme.
Yanping Li, Liaojun Pang, Yuming Wang
2009Audio Digital Signature Algorithm with Tamper Detection.
Xiaoyuan Yang, Xiang Wu, Minqing Zhang
2009Augmented Addition Operation of Conic Curves over Ring Zn.
Guo-jing Li, Tao Wen
2009Automatic IP Interface Synthesis Supporting Multi-layer Communication Protocols in SoC Designs.
Yin-Tsung Hwang, Hua-Hsin Luo
2009Bearings Fault Diagnosis Based on the Optimal Impulse Response Wavelet.
Dan Zhang, Wentao Sui
2009Boosting Graph Embedding with Application to Facial Expression Recognition.
Lei Xiong, Duyan Bi, Xu Zhou, Shiping Ma
2009Browser-Side Countermeasures for Deceptive Phishing Attack.
Huajun Huang, Shaohong Zhong, Junshan Tan
2009Building Trust Territory in Ad Hoc Networks.
Yuan Bai, Xing Zhang, Bin Sun
2009C and M: A New Network Coding Scheme for Wireless Networks.
Xiaoyan Zhu, Hao Yue, Yumin Wang
2009Cepstrum-Based Audio Watermarking Algorithm against the A/D and D/A Attacks.
Xiaoming Zhang, Zhaoyang Yu
2009Certificateless One-Way Authenticated Two-Party Key Agreement Protocol.
Wuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang
2009Collusion-Resilient Fingerprinting Using Cropping and Subsampling.
Yueh-Hong Chen, Hsiang-Cheh Huang
2009Common Friends Discovery with Privacy and Authenticity.
Shin-Yan Chiou, Shih-Ying Chang, Hung-Min Sun
2009Compensating Function of Formant Instantaneous Characteristics in Speaker Identification.
Limin Hou, Juanmin Xie
2009Constructions of Some Difference-Balanced d-form Functions.
Tongjiang Yan, Li Hong
2009Contrast Enhancement Method Based on Average Luminance with Weighted Histogram Equalization.
Shen-Chuan Tai, Yi-Ying Chang, Kang-Ming Li, Ting-Chou Tsai
2009Cost-Benefit Analysis of China's Internet Content Regulation.
Qiang Song, Gang Li
2009Cramer-Rao Lower Bound for Non-coherent TOA Estimation with Impulse Signal.
Jie Liu, Xiaoji Liu, Lin Zheng
2009Cryptanalysis of a Knapsack Public Key Cryptosystem.
Baocang Wang, Hui Liu, Yupu Hu
2009Cryptoanalysis of Two Signcryption Schemes.
Jianhong Zhang, Qin Geng
2009Curvelet Domain Watermark Detection Using Alpha-Stable Models.
Chengzhi Deng, Huasheng Zhu, Shengqian Wang
2009DCT-Based Robust Watermarking with Swarm Intelligence Concepts.
Hsiang-Cheh Huang, Yueh-Hong Chen, Guan-Yu Lin
2009DWT-Based Shot Boundary Detection Using Support Vector Machine.
Jun Li, Youdong Ding, Yunyu Shi, Qingyue Zeng
2009Data Hiding in Halftone Images Using Adaptive Noise-Balanced Error Diffusion and Quality-Noise Look Up Table.
Jing-Ming Guo, Jia-Jin Tsai
2009Deadlock Detection Based on Resource Allocation Graph.
Qinqin Ni, Weizhen Sun, Sen Ma
2009Defending against UDP Flooding by Negative Selection Algorithm Based on Eigenvalue Sets.
Rui Xu, Wen-li Ma, Wen-ling Zheng
2009Design and Integration for Background Subtraction and Foreground Tracking Algorithm.
Tsung-Han Tsai, Chung-Yuan Lin, De-Zhang Peng, Giua-Hua Chen
2009Design of DBA Algorithm in EPON Uplike.
Ya-Min Wang, Yan Liu
2009Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA.
Qiang Gao, Miao Han, Shu-liang Hu, Hai-jie Dong
2009Detecting DoS and DDoS Attacks Using Chi-Square.
Fang-Yie Leu, Chia-Chi Pai
2009Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System.
Fang-Yie Leu, Zhi-Yang Li
2009Detecting Insider Attacks Using Non-negative Matrix Factorization.
Jan Platos, Václav Snásel, Pavel Krömer, Ajith Abraham
2009Detecting Stepping-Stone Intruders with Long Connection Chains.
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle
2009Detection of Abnormal Sound Using Multi-stage GMM for Surveillance Microphone.
Akinori Ito, Akihito Aiba, Masashi Ito, Shozo Makino
2009Development of a Java-Oriented Software General Component Library.
Han Xiao, Zu-xun Zhang, Qiang Wang, Hua-liang Hu
2009Distributed Event-Triggered Trust Management for Wireless Sensor Networks.
Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Qingquan Peng
2009Distributed Video Coding Based on Multiple Description.
Hongxia Ma, Yao Zhao, Chunyu Lin, Anhong Wang
2009Domain Administration of Task-role Based Access Control for Process Collaboration Environments.
Yahui Lu, Li Zhang
2009Dynamic Behavior of SIRS Model with Feedback on Complex Networks.
Damin Zhang, Shaohong Cai
2009Dynamic Behavior of SIS Epidemic Model with Feedback on Regular Lattic.
Damin Zhang, Shaohong Cai
2009Dynamically Constrained One-Bit Transform for Motion Vector Estimation.
Fu-Kun Chen, Jui-Che Teng, Yue-Dar Jou, Wen-Yuan Liao
2009E-government Security Management: Key Factors and Countermeasure.
Jin-Fu Wang
2009ECC-Cache: A Novel Low Power Scheme to Protect Large-Capacity L2 Caches from Transiant Faults.
Guanghui Liu
2009Economical Dental Stereoradiography in Digital Era.
Hsien-Huang Peter Wu, Shih-Hsin Chang, Ping-Kuo Weng, Soon-Lin Chen
2009Efficient Certificate-Based Signature Scheme.
Yang Ming, Yumin Wang
2009Efficient Protection Scheme for SVC Content Based on Network Coding.
Ji Lu, Song Xiao, Chengke Wu
2009Emergency Command System for Geologic Disasters Prevention.
Wenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng
2009Encrypted Fuzzy Vault Based on Fingerprint.
Quan Feng, Fei Su, Anni Cai
2009Evaluating Intrusion Detection Systems in High Speed Networks.
Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani
2009Evaluation and Simulation on the Performance of DHTs Required by P2PSIP.
Zengming Tian, Xiangming Wen, Wei Zheng, Yong Sun, Yinbo Cheng
2009Exploiting RFC2828 as a Domain Vocabulary for Identifying IT Security Literature.
Lidong Wang, Liping Qian
2009Facial Expression Recognition Based on Field Programmable Gate Array.
Jzau-Sheng Lin, Shao-Han Liu, Wu-Chih Hsieh, Yu-Yi Liao, Hongchao Wang, QingHua Lan
2009Fast Fractal Image Coding Using Ambient-Cross Sum of Normalized Block.
Gaoping Li
2009Forward-Secure Certificate-Based Encryption.
Yang Lu, Jiguo Li
2009Full System Simulation and Verification Framework.
Jing-Wun Lin, Chen-Chieh Wang, Chin-Yao Chang, Chung-Ho Chen, Kuen-Jong Lee, Yuan-Hua Chu, Jen-Chieh Yeh, Ying-Chuan Hsiao
2009Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes.
Ximing Li, Bo Yang, Yubin Guo
2009Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls.
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
2009Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion Detection.
Anazida Binti Zainal, Den Fairol Samaon, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin
2009GOP-Level Transmission Distortion Modeling for Video Streaming over Mobile Networks.
Yu Han, Aidong Men, Kan Chang, Ziyi Quan
2009Generalized Analysis Model of Information Security of Computer System Based on Electromagnetic Topology.
Jin Tian, Yang Qiu, Ankun Lin
2009Grounding Grid Corrosion Diagnosis Based on Large Change Sensitivity.
Liqiang Liu, Xianjue Luo, Tao Niu, Kai Wang
2009Guess and Determine Attack on SOSEMANUK.
Lin Ding, Guan Jie
2009H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks.
Wei Ren, Yi Ren, Hui Zhang
2009Hardware/Software Codesign of Resource Constrained Real-Time Systems.
Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh
2009Hierarchical Distributed Alert Correlation Model.
Donghai Tian, Changzhen Hu, Yang Qi, Jianqiao Wang
2009Hierarchical Key Agreement Protocols in Group-User Systems.
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chien-Chih Shen, Pin-You Chen
2009Hierarchical Takagi-Sugeno Models for Online Security Evaluation Systems.
Ajith Abraham, Crina Grosan, Hongbo Liu, Yuehui Chen
2009History and Future Information Based Trust Model in C2C E-commerce.
Shaomin Zhang, Xiayan Zhang, Baoyi Wang
2009Human Visual System Based Watermarking for Color Images.
Kuo-Cheng Liu
2009Hybrid Video Transcoder for Bitrate Reduction of H.264 Bit Streams.
Min Li, Bo Wang
2009ID-Based Non-interactive Deniable Authentication Protocol.
Wei-Min Shi
2009ISAR Imaging of High Speed Moving Targets Based-on Radon Transform.
Feng Tong-an, He Jin, Luo Ying
2009Ideal Perfect Multilevel Threshold Secret Sharing Scheme.
Changlu Lin, Lein Harn, Dingfeng Ye
2009Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce.
Ying Sun, Chunxiang Xu, Fagen Li, Yong Yu
2009Image Compression Algorithm Based on Decreasing Bits Coding.
Shengbing Che, Zuguo Che, Haiyang Wang, Qiangbo Huang
2009Image De-noising Based on Nonlocal Diffusion Tensor.
Han Yu
2009Image Denoising and Magnification via Kernel Fitting and Modified SVD.
Benyong Liu, Xiang Liao
2009Image Encryption with Discrete Fractional Cosine Transform and Chaos.
Lin Zhang, Jianhua Wu, Nanrun Zhou
2009Image Enhancement Based on Nonsubsampled Contourlet Transform.
Yuxin Ma, Jiancang Xie, Jungang Luo
2009Image Moment Based Registration Scheme Utilizing Support Vector Machine.
Jianzhen Wu
2009Image Retrieval Based on 2D Histogram of Interest Points.
Fan-jie Meng, Baolong Guo, Lei Guo
2009Image Retrieval Based on Character-Matching Technology.
Shan Zhao, Jing Liu
2009Image Retrieval Based on Composite of Mean Shift and Assignment Model.
Wenbing Chen, Qizhou Li, Jianwei Yang
2009Image Retrieve Based on Primary Clusters.
Wenbing Chen, Jianwei Yang, Wangwei
2009Image Watermarking Using Phase-Shifting Digital Holography Embedded in the Wavelet Domain.
Mn-Ta Lee, Hsuan T. Chang, Mu-Liang Wang
2009Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale Voting.
Chung-Huang Yang, Shih-Yi Tu, Pei-Hua Yen
2009Implementing and Testing Producer-Consumer Problem Using Aspect-Oriented Programming.
Yang Zhang, Jingjun Zhang, Dongwen Zhang
2009Improvement of Speaker Vector-Based Speaker Verification.
Naoki Tadokoro, Tetsuo Kosaka, Masaharu Katoh, Masaki Kohda
2009Improvement of an EPC Gen2 Compliant RFID Authentication Protocol.
Kuo-Hui Yeh, Nai-Wei Lo
2009Improving the Modified Matrix Encoding on Steganography Method.
YongSoo Choi, Hyoung Joong Kim
2009Information Security Monitoring System Based on Data Mining.
Guangjuan Lv, Ruzhi Xu, Xiangrong Zu, Liwu Deng
2009Information Security Routing Protocol in the WSN.
Li Wei, Chen Ming, Li Mingming
2009Information Security Solution Decision-Making Based on Entropy Weight and Gray Situation Decision.
Lin Chen, Li Li, Yong Hu, Ke Lian
2009Information Security Wireless Sensor Grid.
Li Mingming, Li Baiping, Li Wei, Chen Lei
2009Infrared Face Recognition Based on Radiant Energy and Curvelet Transformation.
Zhihua Xie, Shiqian Wu, Guodong Liu, Zhijun Fang
2009Infrared Small Weak Target Detection via HOSA.
Gaoyu Zhang
2009Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks.
Yu Zhang, Xingshe Zhou, Yee Wei Law, Marimuthu Palaniswami
2009Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation.
Maheyzah Md Siraj, Mohd Aizaini Maarof, Siti Zaiton Mohd Hashim
2009Interactive Visualisation of 3D City Models Based on Adaptive Streaming of 3D-GIS Data.
Zhenping Zhang, Jitao Fang, Runhuan Jing
2009Intra-mode Dependent Coding Method for Image Compression.
Yung-Chiang Wei, Jui-Che Teng, Chien-Wen Chung
2009Intrusion Detection Based on One-class SVM and SNMP MIB Data.
Cui-Mei Bao
2009Joint Entropy Analysis Model for DDoS Attack Detection.
Hamza Rahmani, Nabil Sahli, Farouk Kamoun
2009Key Binding Based on Biometric Shielding Functions.
Huixian Li, Man Wang, Liaojun Pang, Weidong Zhang
2009Known Signature Attack of ID-Based Multisignature Schemes.
Wu-Chuan Yang, Jhih-Syue Jhou
2009Layer Key Management Scheme on Wireless Sensor Networks.
Qingqi Pei, Lei Wang, Hao Yin, Liaojun Pang, Hong Tang
2009Lossy Compression of CFA Image Based on Multiwavelet Packet.
Jing Zheng, Qigui Zhang, Xuemei Zhang
2009Low Bit Rate ROI-Based SAR Image Compression.
Xiao-Hong Yuan, Zhaoda Zhu, Gong Zhang
2009Lung Segmentation for Chest Radiograph by Using Adaptive Active Shape Models.
Jiann-Shu Lee, Hsing-Hsien Wu, Ming-Zheng Yuan
2009MRDWA: Multi-role Dynamic Weighting Aggregation Algorithm in Event Driven Wireless Sensor Networks.
Ying Chen, Jian Shu, Hong Liu, Linlan Liu, Jiajie Gong
2009Majority-Parity-Guided Watermarking for Block-Truncated Images.
Jing-Ming Guo, Yun-Fu Liu
2009Membership-Based Access Control for Trust Negotiation in Open Systems.
Ruo-Fei Han, Hou-Xiang Wang, Yu-Hua Wang, Kai-Ling Zuo
2009Microarray Image Segmentation Using Region Growing Algorithm and Mathematical Morphology.
Ping Ye, Guirong Weng
2009Modeling and Analyzing the Spread of Worms with Bilinear Incidence Rate.
Junhua Chen, Shengjun Wei
2009Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks.
Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou
2009Moving Object Tracking Using Symmetric Mask-Based Scheme.
Chih-Hsien Hsia, Ding-wei Huang, Jen-Shiun Chiang, Zong-Jheng Wu
2009Multi-party Non-repudiation Protocol with Different Message Exchanged.
Yanping Li, Liaojun Pang
2009Multimodal Biometric Recognition Based on Complex KFDA.
Zhifang Wang, Qiong Li, Xiamu Niu, Christoph Busch
2009Multiresolution Target Detection in Wavelet Domain for SAR Imagery.
Xiao-Hong Yuan, Zhaoda Zhu, Gong Zhang
2009National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations.
Yanzhao Li
2009Network Security Situation Awareness Using Exponential and Logarithmic Analysis.
Xiaobin Tan, Guihong Qin, Yong Zhang, Ping Liang
2009Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform.
Xiaorong Cheng, Kun Xie, Dong Wang
2009New Greedy Algorithm for Computing Double-Base Chains.
Ming Li, Kunpeng Wang
2009New Strategy of Efficient SPA-resistant Exponentiations.
Wu-Chuan Yang
2009Non-interactive Evaluation of Encrypted Elementary Functions.
Liang Chen, Chengmin Gao, Yong Xu
2009Nonlocal Curvature-Driven Diffusion Model for Image Inpainting.
Li Li, Han Yu
2009Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source Scaling.
Enke Li, Shangqian Liu, Shimin Yin, Xiaoning Fu
2009Novel Fast Mode Decision Algorithm for P-Slices in H.264/AVC.
Kan Chang, Bo Yang, Wenhao Zhang
2009Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme.
Fanyu Kong, Jia Yu
2009Octa-Log-Polar Fourier Transform for Image Registration.
Xianxiang Wu, Bao-Long Guo, Juan Wang
2009Octagonal Search Algorithm with Early Termination for Fast Motion Estimation on H.264.
Zhaopeng Cui, Dujuan Wang, Guang Jiang, Chengke Wu
2009On Security Notions for Verifiably Encrypted Signature.
Xu An Wang, Xiaoyuan Yang, Qingquan Peng
2009One-way Hash Function Construction Based on Conservative Chaotic Systems.
Qing-Hua Zhang, Han Zhang, Zhao-Hui Li
2009Optimal Combination of H.264/AVC Coding Tools for Mobile Multimedia Broadcasting Application.
Yu Han, Bo Yang, Kan Chang, Ziyi Quan
2009Optimal Information Rates of Novel Graph Based Access Structures.
Mingkun Yang
2009Organizational Barriers to the Implementation of Security Engineering.
Bryan Stewart Cline
2009Paper Study of Embedded System Design Based on RFID Securities.
Ling-Feng Shi, Xin-Quan Lai, Bao-Long Guo
2009Parallel 3-Pixel Labeling Method and its Hardware Architecture Design.
Shyue-Wen Yang, Ming-Hwa Sheu, Jun-Jie Lin, Chuang-Chun Hu, Tzu-Hsiung Chen, Shau-Yin Tseng
2009Performance Analysis of Analog LMS Multiuser Receiver in Transmitted-Reference UWB System.
Lin Zheng, Wei Ge, Hongbing Qiu
2009Performance Analysis of Anonymous Communication System 3-Mode Net.
Kazuhiro Kono, Shinnosuke Nakano, Yoshimichi Ito, Noboru Babaguchi
2009Performance Analysis of Chinese Webpage Categorizing Algorithm Based on Support Vector Machines (SVM).
Xiao Gang, Jiancang Xie
2009Position Verification in Multi-hop Vehicular Networks.
Deepa Susan Rajan, Chetan Yeole, Harsha Nakade, Huirong Fu, Ye Zhu
2009Practical Quantum No-key Protocol with Identification.
Yang Wu, Li Yang
2009Prediction-Based Watermarking Schemes for DCT-Based Image Coding.
Jing-Ming Guo, Chia-Hao Chang
2009Privacy Protection for Speech Information.
Kazumasa Yamamoto, Seiichi Nakagawa
2009Privacy Protection in On-line Shopping for Electronic Documents.
Yu-Chi Chen, Gwoboa Horng, Chang-Chin Huang
2009Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009
2009Proxy Re-encryption Scheme Based on SK Identity Based Encryption.
Xu An Wang, Xiaoyuan Yang
2009Quantum Secure Direct Communication Based on Partially Entangled States.
Xin-yuan Yang, Zhi Ma, Xin Lu, Hong-Xin Li
2009RSA/Shift Secured IFFT/FFT Based OFDM Wireless System.
D. Rajaveerappa, Abdelsalam Almarimi
2009Range-Free Fast and Rough Nodes Localization Algorithm in Wireless Sensor Networks.
Wang Mei, Xiaochuan Sun, Zheng Hao
2009Reducing Specular Reflection Components of Chrome-Plated Surface with Varying Light Direction.
Li Chang Jiang, Zhong Zhang, Tetsuo Miyake, Takashi Imamura, Hisanaga Fujiwa
2009Redundant Ridgelet Transform and its Application to Image Processing.
Yan Li, Shengqian Wang, Chengzhi Deng
2009Remark on Yu et al.'s Online/Offline Signature Scheme in CT-RSA 2008.
Xiao-Long Ma, Zhiwei Wang, Lize Gu, Yixian Yang
2009Research on 3D Reconstruction Procedure of Marked Points for Large Workpiece Measurement.
Zhanli Li, Yuan Wang
2009Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of Kernel.
Xuedou Yu
2009Research on Algorithm of Digital Filtering Based on Video Information Security.
Jin Tian, Yang Qiu, Liuyu Qian
2009Research on Attack Intention Recognition Based on Graphical Model.
Wu Peng, Zhigang Wang, Junhua Chen
2009Research on Early Warning for Worm Propagation Based on Area-Alert-Level.
Lina Zhu, Chao-yi Sun, Li Feng
2009Research on Equiponderant Forwarding within Multi-nexthop Interfaces.
Ning-ning Liang, Xuan-Yong Zhu
2009Research on Gravity-Based Anomaly Intrusion Detection Algorithm.
Baoyi Wang, Ranran Jin, Shaomin Zhang, Xiaomin Zhao
2009Research on Improved Algorithm for Chinese Word Segmentation Based on Markov Chain.
Pang Baomao, Shi Haoshan
2009Research on Integration of Safety Analysis in Model-Driven Software Development.
Feng Chen, Weihua Li, Dingyi Fang, Xiaojiang Chen
2009Research on Intrinsic Safety Behavior of Inductor-Disconnected-Discharge of Boost DC-DC Converters.
Shulin Liu, Li Yan
2009Research on Intrusion Detection Based on an Improved SOM Neural Network.
Dianbo Jiang, Yahui Yang, Min Xia
2009Research on Model of Trust Degrees for PKI.
Mingde Zhang, Xuefeng Zheng, Wensheng Yang, Shuwang Lv, Qingguo Zhang
2009Research on New Classification Methods of Remote Sensing of Mass Ingredient without Vegetation of Hei Shan Gorge in Yellow River Basin.
Shudong Wang, Xiaohua Wang
2009Research on Quantitative Evaluation for Integrity.
Lihua Yin, Yunchuan Guo
2009Research on Security Architecture for Defending Insider Threat.
Hui Wang, Heli Xu, Bibo Lu, Zihao Shen
2009Research on System of Chinese Document Copy Detection.
Yuzhu Cheng, Chunrong Qiu, Weiqi Tang, Wenda Deng
2009Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude Modulation.
Yang Qiu, Jin Tian, Liuyu Qian
2009Researches on Integrating Database Access Control and Privacy Protection.
Yonghong Yu
2009Resistance DPA of RSA on Smartcard.
Ji-fang Jin, Er-hong Lu, Xian-wei Gao
2009Reversible Information Hiding Considering Hierarchical Access Control.
Masaaki Fujiyoshi, Seungwu Han, Hitoshi Kiya
2009Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images.
Cheng-Hsing Yang, Cheng-Ta Huang, Shiuh-Jeng Wang
2009Risk Assessment Model on the Internal Corporate Governance Based on the SPA.
Jibin Ma, Huiling Gu, Yonghao Sun, Xujie Hu
2009SAR Image Target Recognition Based on Hu Invariant Moments and SVM.
Fu Yan, Wang Mei, Zhang Chunqin
2009Scanning Task Scheduling Strategy in Distributed Vulnerability Detection System.
Baoyi Wang, Jing Li, Shaomin Zhang, Xueying Guo
2009Secure Access Control Scheme of RFID System Application.
Yu-Chih Huang
2009Secure Constructing Bluetooth Scatternet Based on BTCP.
Xin Yu, Yuping Wang
2009Secure Disk with Authenticated Encryption and IV Verification.
Fangyong Hou, Nong Xiao, Fang Liu, Hongjun He
2009Security Analysis of the Kerberos Protocol Using BAN Logic.
Kai Fan, Hui Li, Yue Wang
2009Security Enhancement of the Authentication Protocol for RFID Systems.
Yung-Cheng Lee, Wen-Chung Kuo, Yi-Chih Hsieh, Ta-Cheng Chen
2009Security Threats and Countermeasures for Intra-vehicle Networks.
David Wampler, Huirong Fu, Ye Zhu
2009Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve.
Caimei Wang, Zhengmao Li
2009Shibboleth Access for Resources on the National Grid Service (SARoNGS).
Xiao Dong Wang, Mike Jones, Jens Jensen, Andrew Richards, David Wallom, Tiejun Ma, Robert Frank, David Spence, Steven Young, Claire Devereux, Neil Geddes
2009Sinusoidal Signals Pattern Based Robust Video Watermarking in the 3D-CWT Domain.
Cheng Deng, Jie Li, Meng Jia, Xinbo Gao
2009Small Moving Infrared Target Detection Algorithm under Low SNR Background.
Kai Wang, Yan Liu, Xiaowei Sun
2009Soft DSP Design Methodology of Face Recognition System on Nios II Embedded Platform.
Hao-Chung Shih, Chian C. Ho
2009Space Time Block Coded MIMO System with Redundant Antennas.
Feng Wang, Xia Liu, Marek E. Bialkowski
2009Study on Centralized Authorization Model Supporting Multiple Access Control Models.
Shaomin Zhang, Haiyan Zhang, Baoyi Wang
2009Study on Ultrasonic Ranging System Design.
Lihua Deng
2009Study on the Control of a Two-wheeled Unstable Vehicle Based on Sensitivity Analysis.
Yanzhao Li, Shengli Qu, Jiahui Zhu, Jianqin Sun
2009Support Vector Machine Based on Possibility Degrees and Fault Diagnosis.
Du Jingyi, Wang Mei, Cai Wenhao
2009Swarm Intelligence: Ant-Based Robot Path Planning.
Jing Zhou, Guanzhong Dai, De-Quan He, Jun Ma, Xiao-Yan Cai
2009Testability Analysis of Grounding Grids Using Network Transformation.
Tao Niu, Yingjiao Zhang, Debo Zhang, Liqiang Liu, Xianjue Luo
2009Texture Feature Analysis on Erosion and Wear in Artillery Chamber.
Xiao-ning Fu, En-ke Li, Wen-jing Gao
2009The Application and Study of Graph Cut in Motion Segmentation.
Ye Hou, Bao-Long Guo, Jeng-Shyang Pan
2009The Application on the Evaluation of Quality of Universities Undergraduate Theory Teaching Work Based on Artificial Neural Network.
Jun-qiao Qi, Chang-Long Wang, Yan-ming Qi
2009The Design and Implementation of Security Defense Technology Based on Mandatory Running Control.
Jizhen Liu, Kehe Wu, Tong Zhang, Gang Ma
2009The Detection of Bi-frequency Weak Signal Based on Chaos and Correlation.
Mei Wang, Huifeng Zhang, Yong Yan
2009The Improving of IKE with PSK for Using in Mobile Computing Environments.
Dingguo Yu, Nan Chen
2009The Method of Equalization Based on Iterative Interference Cancellation for SCCPM System.
Zhao Wusheng, Fu Yongqing, Han Zhixue
2009The Research of NULL Convention Logic Circuit Computing Model Targeted at Block Cipher Processing.
Yalei Cui, Zibin Dai
2009The Research of Simulation for Network Security Based on System Dynamics.
Hongshan Kong, Mingqing Zhang, Jun Tang, Changyuan Luo
2009The Research on the Measurement of China Internet Illegal and Harmful Content.
Qiang Song, Gang Li
2009The Reversible Network Cascade Based on Reversible Logic Gate Coding Method.
Hui Li, Zhijin Guan, Shanli Chen, Yuxin Chen
2009The SOBER Family Ciphers Reconfigurable Processing Architecture Design.
Zhiyuan Wang, Jianhua Huang, Ziming Guan
2009The Sync Tracing Based on Improved Genetic Algorithm Neural Network.
Yuanbin Hou, Chunfeng Song, Ning Li
2009The Testing and Evaluating System for the Security Operating System Based on the Mechanism of Keyword-Driven.
Xing Liu, Yan Li, Mian Cai, Ying Guo
2009Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression.
Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, Peter A. Bath, Zuraini Ismail
2009Threats to Health Information Security.
Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail
2009Towards Provably Secure On-demand Source Routing in MANET.
Liqiang Mao, Jianfeng Ma, Xuewen Dong
2009Towards Secure Content Based Dissemination of XML Documents.
Mohammad Ashiqur Rahaman, Henrik Plate, Yves Roudier, Andreas Schaad
2009Trusted Computing Based Mobile DRM Authentication Scheme.
Zhen Yang, Kefeng Fan, Yingxu Lai
2009Two Efficient Fragile Web Page Watermarking Schemes.
Peng Sun, Hongtao Lu
2009Universal Steganalysis Based on Statistical Models Using Reorganization of Block-based DCT Coefficients.
Shaohui Liu, Lin Ma, Hongxun Yao, Debin Zhao
2009Universal Steganalysis to Images with WBMC Model.
Xiaoyuan Yang, Shifeng Wang, Jia Liu
2009Video Identification Using Spatio-temporal Salient Points.
Yue-Nan Li, Zhe-Ming Lu
2009Visibility Estimation Based on Mean Shift.
Wenbing Chen, Xiaolei Zhang, Jianwei Yang
2009W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks.
Zhanyong Tang, Rui Qi, Dingyi Fang, Yangxia Luo
2009Watermarking Relational Databases for Ownership Protection Based on DWT.
Chuanxian Jiang, Xiaowei Chen, Zhi Li
2009Waveform Analysis Mathematic Based on Ultrasonic Displacement Measurement.
Yuhui Wang, Ju Dai
2009Webpage Encryption Based on Polymorphic Javascript Algorithm.
Bai Zhongying, Qin Jiancheng
2009Whole Frame Loss Recovery Algorithm for H.264 Decoders.
Min Li, Bo Wang
2009Windows Memory Analysis Based on KPCR.
Ruichao Zhang, Lianhai Wang, Shuhui Zhang
2009Words Clustering Based on Keywords Indexing from Large-scale Categorization Corpora.
Liu Hua
2009Zero Packet Loss Hand-off Mechanism in SIP-Based Wireless Networks.
Ching-Lung Chang, Jia-Yi Syu, Yuan-Sun Chu
2009Zero-Collision RFID Tags Identification Based on CDMA.
Lih-Chyau Wuu, Yen-Ju Chen, Chi-Hsiang Hung, Wen-Chung Kuo
2009f8 Keystream Generator with SMS4 as Core Algorithm.
Wang Yingsong, Chen Wei