The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISECS"( http://dblp.L3S.de/Venues/ISECS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/isecs

Publication years (Num. hits)
2008 (222)
Publication types (Num. hits)
inproceedings(221) proceedings(1)
Venues (Conferences, Journals, ...)
ISECS(222)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 347 occurrences of 260 keywords

Results
Found 222 publication records. Showing 222 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Daofang Cheng, Xiaolong Li 0001, Wenfa Qi, Bin Yang 0001 A Statistics-Based Watermarking Scheme Robust to Print-and-Scan. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF print-and-scan, distribution, DCT, digital watermarking
1Decai Meng, Qingfei Min, Yuping Li Study on Trust in Mobile Commerce Adoption - A Conceptual Model. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trust, Adoption, Mobile Technology, Mobile Commerce
1Xinxia Song, Zhigang Chen A Distributed Electronic Authentication Scheme in E-Business System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed Electronic Authentication, conic curve, E-Business System
1Jianbin Huang, Heli Sun A Reliable Web Service Implementation Approach for Large Commercial Applications. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web Service Provisioning, Reliability
1Xiaoming Han Research on the Security of Information and Data in the Communication. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shan-Qing Guo, Zhong-Hua Zhao An Anomaly Intrusion Detection Model Based on Limited Labeled Instances. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF density-based clustering algorithm, Intrusion detection, k-means
1Wei Zhou 0006, Christoph Meinel Enforcing Information Flow Constraints in RBAC Environments. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Fu Yu, Xiaoping Wu, Zemao Chen, Qing Ye A Wavelet Digital Watermarking Algorithm Based on Chaotic Mapping. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF wavelet, watermarking, chaotic mapping
1Xiaojun Ye, Lei Jin, Bin Li A Multi-Dimensional K-Anonymity Model for Hierarchical Data. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yiqun Li, Zhaoran Xu The Online Third-party Payment Strategies under Price War. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Third-party payment, XML, Price, Value-added service
1Han-ling Zhang, Shuyi Wang A New Steganalysis Method Using High-pass Filter for JPEG Image. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF JPEG images, Moments in frequency domain of histogram, block characteristics, Steganalysis, High-pass filtering
1Jian-min Han, Huiqun Yu, Yu Juan, Ting-ting Cen A Complete (alpha, k)-Anonymity Model for Sensitive Values Individuation Preservation. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (a, k)-Anonymity Model, Homogeneity Attack, K-anonymity, l-Diversity
1Leon Pan Using Criterion-Based Access Control for Multilevel Database Security. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jun Yang, Xianze Yang Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tripartite key agreement protocol, public key cryptography, elliptic curve, matrix, discrete logarithm problem, optimal extension field
1Fei Yu 0001, Qi Luo, Yongjun Chen, Zhigang Chen (eds.) Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China Search on Bibsonomy Isecs The full citation details ... 2008 DBLP  BibTeX  RDF
1Xinwu Li Automobile Enterprise's Mixed Sale Mode Based on E-commerce Supply Chain Management. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF E-commerce sales mode, Mixed marketing mode, Automobile enterprises, Supply chain management
1Ling Zhan, Jiguang Wan, Peng Gu Metadata Management for Distributed Multimedia Storage System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multimedia, Metadata, Distribute, Storage
1Zhaoyang Qu, Hong Gao, Yi Zhu Research on High-accuracy Position Prediction Algorithm in Online Game. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Hui Tan The Application of RFID Technology in the Warehouse Management Information System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xuewang Zhang, Linlin Wang Key Technologies for Security Enhancing of Payment Gateway. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF payment gateway, security enhancing, fusion-based solution for SSL and SET protocols, secure hash algorithm, AES
1Jin Yan, Li Tong Compare and Analysis of Security Strategy in WAP and I-Mode Network. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF I-Mode, WIM, WAP, Smartcard
1Jianhu Cai, Huanhuan Wang, Gengui Zhou Study on a Two-Echelon Supply Chain VMI Model under Demand Uncertainty. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VMI, news vendor model, supply chain
1Bin Jiang, Xijian Ping, Tao Zhang 0031 Pattern Analysis Applied on Steganalysis for Binary Text Images. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF steganalysis, pattern analysis
1Shimin Wei, Zepeng Zhuo Research on PKI Model Based on NTRU. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NTRU cryptosystem, NTRU signature, PKI
1Zenggang Xiong, Xuemin Zhang, Jianxin Chen Research on Grid Resource Discovery Scheme Integrated P2P Mode. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF peer to peer, grid, resource discovery
1Qiong Wei, Yansheng Lu Preservation of Privacy in Publishing Social Network Data. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data Publication, Social Network Data, k-Subgraph, Privacy Preservation
1Jingbo Hao, Jianping Yin A Preliminary Study of Coordinated Worm Networks. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF coordinated worm network, peer-to-peer, application, construction
1Li Jian An Agent Bilateral Multi-issue Alternate Bidding Negotiation Protocol Based on Reinforcement Learning and its Application in E-commerce. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF E-commerce, Multi-agent
1Jitao Fang, Shusong Yu, Xiangqian Ding Development of Internet-based Long-range Manufacture Quality Monitoring System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Quality Monitoring, spc, network environment
1Qi Yue, Hailin Lan, Luan Jiang Ownership Motivation and Corporate Performance in IT Industry under the Wave of E-Commerce: An Empirical Study based on Chinese Public Companies. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ownership Motivation, Corporate Performance, E-Commerce, IT Industry
1Zhihong Li A Study on the Factors Influencing Knowledge Transfer among Organizations in Strategic Alliances. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF organizations in strategic alliances, knowledge transfer, influencing factors
1Ding Yong Tamper Difficult Technique for Data Residing on Passive Storage. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Passive storage, Pairing, Tamper
1Ranzhe Jing, Jianwei Yu, Zuo Jiang Exploring Influencing Factors in E-Commerce Transaction Behaviors. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF transaction behaviour, E-commerce, transaction process, influencing factors
1Yang Liu An Analysis of Knowledge Sharing Incentive Mechanism inside the Enterprise Based on Evolutionary Game. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yaling Zhang, Xiaofeng Wang Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message Substitute Attack, Concurrent Signatures
1Yunpeng Zhang, Fei Zuo, Zhengjun Zhai, Xiaobin Cai A New Image Encryption Algorithm Based on Multiple Chaos System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xiangran Cheng, Xingyuan Chen, Bin Zhang 0015, Yan Yang A Novel Trust Collecting Mechanism Based on Publish/Subscribe Scheme in Grid Computing. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trust collecting, dynamic trust management, grid security
1Juan Wang, Yajie Zhou, Huanguo Zhang The Simplified Inductive Approach to Verifying Security Protocols. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF inductive approach, security protocol, belief logic
1Like Chen, Runtong Zhang A Key-dependent Cipher DSDP. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Block cipher algorithm, DSDP structure
1Hongju Zhang, Jiajia Liu, Zhijun Yan A Research of Outsourcing Decision-making Based on Outsourcing Market Maturity. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF outsourcing market maturity model, decision-making, CMM
1Luchuan Liu, Jing Lu, Xiaohong Yang Enterprise E-Business Transformation: A Case Study in China. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Guangshu Chang The Analysis of Supply Chain Procurement Strategy in E-Commerce. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF e-commerce, supply chain, e-procurement
1Jinsong Gao, Jinhui Xu, Zibo Zhou, Zhuojun Li Customer Satisfaction Evaluation for Mobile Commerce Based on Fuzzy Comprehensive Evaluation. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evaluation, mobile commerce, Customer Satisfaction, fuzzy comprehensive evaluation
1Ruisong Ye, Huiliang Li A Novel Image Scrambling and Watermarking Scheme Based on Cellular Automata. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Zhihong Li, Minxia Li Research on Influencing Factors of Consumer Initial Trust Based on Mobile Commerce. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Initial trust, Mobile commerce, Influencing factors, Online trust
1Chen Pang, Xiaofen Ji An Empirical Study on Predicting User Purchase Intention on the Creative Product: A Case of Apparel. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF online behavior, creative products, consumer characteristics, Technology Acceptance Model
1Liu Han-xia, Li Rong-jun Responsibility of Net-bank in Electronic Payment. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF net-bank, payment tools, e-commerce, responsibility
1Qing Zhang, Qiaoyan Wen, Gengli Chen Efficient Fair Contract Signing Protocol from Bilinear Pairings. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trusted Third Party (TTP), bilinear pairings, fair exchange, contract signing
1Fang Fang, Ye Xin, Xia Yun, Xu Haitao An Opponent's Negotiation Behavior Model to Facilitate Buyer-seller Negotiations in Supply Chain Management. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Buyer-seller Negotiation, Opponent's Behavior Model (OpNBM), Artificial Neural Network, Supply Chain Management
1Chunhua Ju, Feipeng Guo Research and Application of Customer Churn Analysis in Chain Retail Industry. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Customer Churn, Chain Retail Industry, Support Vector Machine, Principal Component Analysis
1Shufen Peng, Jingsha He, Yao Meng Reputation-based Trust Update in Network Environment. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Limao Yang, Xuan Tang Research of C2C E-Business Trust Evaluation Model Based on Entropy Method. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nie Gang A Scheme of Workflow Management System Based on Web Services. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF WFMS, QoWS, ontology, Web Service
1Ching-Huai Peng The Relationships between the Antecedents of Innovativeness and Business Performance. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF learning orientation, entrepreneurial orientation, innovativeness, organizational structure, business performance, market orientation
1Lixia Yang, Xun Liu, Changyong Xu Hindrances to the Development of Tourism E-Commerce in China. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tourism E-commerce (TEC), technical hindrance, legal hindrance
1Changji Wang, Rongbo Lu An ID-based Transferable Off-line E-Cash System with Revokable Anonymity. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Transferable E-Cash, Group Signature, Restrictive Partially Blind Signature
1Jiaxin Yu, Xinsheng Wang, Jianfei Li, Xu Nan An Effective Fragile Document Watermarking Technique. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fragile document watermark, Binary image, Wet paper code
1Kaizhong Jiang, Zhao Lu, Yuan-Qiong Wu, Junzhong Gu An Algorithm of Topic Distillation Based on Anchor Text. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wenzhe Qi, Chenghui Yang, Jianjun Meng Circuit Failure Diagnosis Analysis and Research Based On Neural Network. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF failure diagnosis, BP network, training simulation, Elman network
1Jianyong Chen, Xiaomin Wang, Liwen He An Architecture for Differentiated Security Service. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Architecture, Network, Security service
1Qiaozhuo Du, Fei Peng A Zero-Watermark Algorithm with Real-Mean for 2D Engineering Graphic. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Zero-watermark, 2D Engineering graphic, Logistic Chaotic system
1Xiaoming Zhang, Xiong Yin, Zhaoyang Yu Histogram Specification-based Audio Watermarking Technology against Filtering Attacks in Time Domain. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Histogram specification, Algorithm, Filtering, Capacity, Audio watermarking
1Rui Guo, Bosheng Zhou Cross Cookie: A Cookie Protocol for Web Mashups. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HTTP cookie, Web mashup
1Liu Wei-Peng, Hu Ju A Formal Model of Trust and Security for Task-Oriented Information System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Zhongquan Zou The Study on Electronic Commerce and Development of International Logistics. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Debasis Giri, Parmeshwary Dayal Srivastava Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Cryptanalysis, Smart Card, Timestamp
1Liu Jindi, Xu Yong The Credit Risk Analysis and Prevention of Third Party Payment Platform. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yejiang Zhang, Zhitang Li, Zhengbing Hu, Hao Tu, Huaiqing Lin A P2P E-commerce Related Network Security Issue: P2P Worm. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Peer-to-Peer, Invasive software
1Jun Yu, Bin Xu A Framework for Seamless Integration of Legacy Business Applications into Enterprise Business Intelligent System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Business application integration, Enterprise business intelligent system, Legacy System
1Huijuan Lu, Jianguo Chen, Wei Wei Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection, Bayesian networks, Anomaly detection
1Yong Xu The Mechanism Design of Third Party Assure-Payment Platform. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Assure-Payment, Third Party Platform, btob
1Jiandong Liu, Shuhong Wang 0002, Youming Yu TDHA-A One-Way Hash Algorithm Based on Extended Integer Tent Maps with Dynamic Properties. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Bingru Yang, Zefeng Song, Yinglong Wang, Wei Song 0004 A New Web Text Clustering Algorithm Based on DFSSM. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Tao Liu, Zhifeng Hu, Yan Zhou 0002, Zhijie Wang A Modified Resource Limited Artificial Immune System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Resource Limited, Artificial Immune System, Modified
1Qing Yao, Jing Zhang, Haiyang Wang Business Process-Oriented Software Architecture for Supporting Business Process Change. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SOA, Software Architecture, Configuration, Business Process Management, Process Variability
1Qi Ming, Xie Jingxu Research on Witkey Model Based on TRIZ. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF witkey, innovation, TRIZ
1Shaobo Zhong Information Intelligent System based on Web Data Mining. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yong-Zhong He, Zhen Han, Ye Du Context Active RBAC and its Applications. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Simulation, Context, RBAC
1Congxu Zhu, Yuping Hu A Multipurpose Watermarking Scheme for Image Authentication and Copyright Protection. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Qisong Chen, Yun Wu, Xiaowei Chen Research on Customers Demand Forecasting for E-business Web Site Based on LS-SVM. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF customers demand, forecasting, E-business, LS-SVM
1Yongzhong Li, Hua Zhu, Ruiqing Yu, Ge Yang, Jing Xu An Adaptive Blind Watermarking Algorithm Based on DCT and Modified Watson's Visual Model. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Watermarking Algorithm, Watson’s Visual Model, DCT, Blind Watermark
1Hui Chen, Zheng Li The Factors Influencing Chinese Online Shopper's Satisfaction in Web2.0 Era. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF online shopper, web 2.0, satisfaction
1Tao Zhou 0007 The Impact of Perceived Value on User Acceptance of Mobile Commerce. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1GaoJun Fan, Feng Liang, Shiyao Jin An Efficient Approach for Point Coverage Problem of Sensor Network. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xiaofeng Zhang A New Modeling Method for the Data Analysis Solution in Business. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay Probability of Attack Based on System Vulnerability Life Cycle. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Zero-day attack, Exploit code, Risk window, Radar chart, Vulnerability, Exploits, Life cycle, Exposure, POA
1Chunhua Ju, Qibei Lu, Zhongyong Kong The Research and Design of Grid-based Business Intelligence Network-BGBIN. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data Mining, Grid, Business Intelligence, OGSA, Intelligence Network
1Qi Yuan, Zhao Xiaokang, Zhang Qiong Key Technology and System Design in Mobile Supply Chain Management. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Mobile supply chain, information system, supply chain management
1Qiaolian Cheng, Ruijin Zhang, Yezhuang Tian Study on Information Technology Capabilities based on Value Net Theory. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information technology capabilities, value net, core technology, culture
1Yi Ren, Zhiting Xiao, Sipei Guo An Extended RBAC Model for Uniform Implementation of Role Hierarchy and Constraint. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, access control, RBAC
1Xiao-neng Xie, Fei Wu 0001 Automatic Video Summarization by Affinity Propagation Clustering and Semantic Content Mining. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Clustering, Video Summarization, Affinity Propagation
1Shaohui Wang Modification and Improvement on Group Signature Scheme without Random Oracles. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anonymity, Group Signature, Random Oracle Model, Bilinear
1Hongqi Li, Zhuang Wu, Xiaogang Ji Research on the Techniques for Effectively Searching and Retrieving Information from Internet. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data mining, Search engines, Knowledge discovery, Web mining
1Ying Mei, Liangsheng Zhu High Efficiency Association Rules Mining Algorithm for Bank Cost Analysis. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bank cost analysis, association rules mining, incremental mining
1Wenfang Sun, Huaizhen Ye Research on Entropy Model of Order Degree of Fractal Supply Chain Network. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Liang Wang, Yajun Guo, Huifang Yan A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Feng Chen 0015, Jinshu Su A Flexible Approach to Measuring Network Security Using Attack Graphs. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF measure, network security, attack graph
1Yan Cao, Yanli Yang, Huamin Wang Integrated Routing Wasp Algorithm and Scheduling Wasp Algorithm for Job Shop Dynamic Scheduling. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wasp colony algorithm, J2SE, Eclipse, Dynamic scheduling, Job shop scheduling
1Wei Sun, Xiangwei Kong, Dequan He, Xingang You Information Security Game Analysis with Penalty Parameter. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Zhihua Hu, Jiping Niu A Numeric Watermark Method Based on Valve-Value Surface. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 222 (100 per page; Change: )
Pages: [<<][1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license