close
1.

電子ブック

EB
Dominik; Arslan, Tughrul; Fang, Wai Chi Slezak, Tughrul Arslan, Wai-chi Fang, Tai-hoon Kim, Dominik Slezak, Xiaofeng Song
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
The Weighting Analysis of Influence Factor in Clinical Skin Physiology Assessment via Rough Set Method / Hui-Yi Liang ; Ya-Ting Lee ; Mei-Li You ; Kun-Li Wen
Identifying Candidate Disease Gene GAD2 for Obesity by Computational Gene Prioritization Tool Endeavour / Huanping Zhang ; Xiaofeng Song ; Huinan Wang
A Novel Suppression Operator Used in optaiNet / Jungan Chen ; Feng Liang ; Wenxin Chen
Principal Subspace Analysis Based BCG Artifact Removal in Single Channel EEG Signal Measured Inside MRI Scanner / Tahir Rasheed ; Young-Koo Lee ; Sungyoung Lee
Genetical Analysis of Ascochyta Blight Resistance in Chickpea / Alireza Taleei ; Homayoun Kanouni ; Michael Baum
A Pmma Micro-suction Tool for Capsular Endoscope Using a Solid Chemical Propellant / Ho-soo Park ; Kyo-in Koo ; Sang-min Lee ; Jae-won Ban ; Hyo-young Jeong ; Dong-il Cho
Statistical Analysis of Hippocampus Shape Using a Modified Mann-Whitney-Wilcoxon Test / Nikhil Ram Mohan ; Carey Priebe ; Youngser Park ; Majnu John
QTL Mapping for Forage Quality-Related Traits in Barley / Barat Ali Siahsar ; Seyed Ali Peighambari
Fluorimetric Determination of L-3-Hydroxybutyrate Concentrations in the Serum of Normal and Aristolochic Acid-Treated Mice / Chien-Ming Chen ; Yih-Huei Uen ; Chen-Yi Kuo ; Tzu-Chuan Huang ; Jen-Ai Lee
Designing a Column-Switching High-Performance Liquid Chromatograph System for Enantiomeric Separation of Mouse Urinary D, L-Lactate / Chi-Fu Yen
A New Approach for Veins Detection / Dana Lodrová ; Radim Dvořák ; Martin Drahanský ; Filip Orság
An Analysis of Social Guarantees for Context Based Applications / Juanita Pedraza ; Miguel A. Patricio ; Agustin De Asís ; Jose M. Molina
Data Warehouse Approach to Build a Decision-Support Platform for Orthopedics Based on Clinical and Academic Requirements / Sheng-Hui Lin ; Yuan-Chii G. Lee ; Chien-Yeh Hsu
Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding) / Maqsood Mahmud ; Muhammad Khurram Khan ; Khaled Alghathbar
DNA Microarray Classification Using Single Hidden-Layer Feedforward Networks Trained by SVD / Hieu Trung Huynh ; Jung-Ja Kim ; Yonggwan Won
The Relationship Analysis of Skin Physiology Factors via Grey Theory / Chian-Song Chiu
Advanced Information and Computational Technology for Biomedical Researches (Special Session)
Advanced Analysis Information Architecture for Dosage Evaluation of Morphine Combining Adjunct / Hsiao-Hsien Rau ; Wei-Tse Tang
DICOM-Based Multi-Center Electronic Medical Records Management System to Support Clinical Diagnosis / Jui-Hung Kao ; Yu-Ping Sung
Knowledge Management on the Novel Lage-Like GlcNAc-Transferase Protein Family / Kuo-yuan Hwa ; Wan-Man Lin ; Ghueh-Pai Lee ; Mei-Yu Chen
Phylogenetic Analysis of HA Proteins of Influenza Virus H1N1 Reveal New Insight on Virus Pandemic
Author Index
The Weighting Analysis of Influence Factor in Clinical Skin Physiology Assessment via Rough Set Method / Hui-Yi Liang ; Ya-Ting Lee ; Mei-Li You ; Kun-Li Wen
Identifying Candidate Disease Gene GAD2 for Obesity by Computational Gene Prioritization Tool Endeavour / Huanping Zhang ; Xiaofeng Song ; Huinan Wang
A Novel Suppression Operator Used in optaiNet / Jungan Chen ; Feng Liang ; Wenxin Chen
2.

電子ブック

EB
Dominik; Fang, Wai-Chi Slezak, Kirk P. Arnett, Wai-chi Fang, Tai-Hoon Kim, Dominik Slezak
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Applications of Reversible Data Hiding Techniques with the Quick Response Codes / Hsiang-Cheh Huang ; Feng-Cheng Chang ; Wai-Chi Fang
A New Approach in T-FA Authentication with OTP Using Mobile Phone / Abdulaziz S. Almazyad ; Yasir Ahmad
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows / Seyed Hossein Ahmadinejad ; Saeed Jalili
A Study on Secure Contents Using in Urban Computing / Hoon Ko ; Jongmyung Choi ; Carlos Ramos
Shadow Generation Protocol in Linguistic Threshold Schemes / Marek R. Ogiela ; Urszula Ogiela
Analysis of Handwritten Signature Image / Debnath Bhattacharyya ; Poulami Das ; Samir Kumar Bandyopadhyay ; Tai-hoon Kim
The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device / Bo-heung Chung ; Min-ho Han ; Ki-young Kim
Hardware Based Data Inspection for USB Data Leakage Prevention / DongHo Kang ; BoHeung Jung ; KiYoung Kim
Grayscale Image Classification Using Supervised Chromosome Clustering
Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models / Linda Ariani Gunawan ; Peter Herrmann ; Frank Alexander Kraemer
Impact of Malicious Node on Broadcast Schemes / Aneel Rahim ; Fahad bin Muyaha
Hierarchical Identity-Based Identification Schemes / Ji-Jian Chin ; Swee-Huay Heng ; Bok-Min Goi
The Trend of the Security Research for the Insider Cyber Threat / Jaeseung Hong ; Jongwung Kim ; Jeonghun Cho
MIMO Wiretap Channel: A Scalar Approach / Mohammad Rakibul Islam ; Jinsang Kim
Security Testing for Operating System and Its System Calls / Gaoshou Zhai ; Hanhui Niu ; Na Yang ; Minli Tian ; Chengyu Liu ; Hengsheng Yang
Efficient Group Signature with Forward Secure Revocation / Haimin Jin ; Duncan S. Wong ; Yinlong Xu
Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion / Jieren Cheng ; Jianping Yin ; Yun Liu ; Zhiping Cai ; Chengkun Wu
Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code / Tie-Ming Liu ; Lie-hui Jiang ; Hong-qi He ; Ji-zhong Li ; Xian Yu
Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code / Yonglong Wei ; Xiaojuan Zheng ; Jinglei Ren ; Xudong Zheng ; Chen Sun ; Zhenhao Li
Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's Caricature / Dakshina Ranjan Kisku ; Phalguni Gupta ; Jamuna Kanta Sing
A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network / Seokung Yoon ; Hyuncheol Jung ; Kyung-Seok Lee
DDoS Attack Detection Using Three-State Partition Baaed on Flow Interaction / Boyun Zhang
A Development of Finite State Machine Create Tool for Cryptography Module Validation / Jae-goo Jeong ; Seung-yong Hur ; Gang-Soo Lee
A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments / Yuan Tian ; Biao Song ; Eui-Nam Huh
Fusion of Multiple Matchers Using SVM for Offline Signature Identification / Phalgum Gupta
A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card / Sheikh Ziauddin
Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors / Peter Pecho ; Jan Nagy ; Petr Hanáček ; Martin Drahanský
Accelerometer Based Digital Video Stabilization for Security Surveillance Systems / Filip Orság ; Pair Hanáček
Escrowed Deniable Identification Schemes / Pairat Thorncharoensri ; Qiong Huang ; Willy Susilo ; Man Ho Au ; Yi Mu ; Duncan Wong
Insights into Malware Detection and Prevention on Mobile Phones / Qiang Yan ; Yingjiu Li ; Tieyan Li ; Robert Deng
Automation of Post-exploitation: Focused on MS-Windows Targets / Mohammad Tabatabai Irani ; Edgar R. Weippl
Speaker Dependent Frequency Cepstrum Coefficients
Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection / David A. Carvalho ; Manuela Pereira ; Mário M. Freire
A Simple Encryption Scheme for Binary Elliptic Curves / Brian King
Analysis of Text Complexity in a Crypto System - A Case Study on Telugu / M.S.V.S. Bhadri Raju ; B. Vishnu Vardhan ; G.A. Naidu ; L. Pratap Reddy ; A. Vinaya Babu
Symmetric-Key Encryption for Wireless Internet SCADA / Rosslin John Robles ; Min-Kyu Choi
An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU / En Zhu
Author Index
Applications of Reversible Data Hiding Techniques with the Quick Response Codes / Hsiang-Cheh Huang ; Feng-Cheng Chang ; Wai-Chi Fang
A New Approach in T-FA Authentication with OTP Using Mobile Phone / Abdulaziz S. Almazyad ; Yasir Ahmad
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows / Seyed Hossein Ahmadinejad ; Saeed Jalili
3.

電子ブック

EB
Dominik; Ma, Jianhua; Sandnes, Frode Eika ; Gu, Bongen Slezak, Wai-chi Fang, Bongen Gu, Byeong-Ho Kang, Tai-Hoon Kim, Jianhua Ma, Frode Eika Sandnes, Dominik Slezak
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
4.

電子ブック

EB
Young-hoon Lee, Wai-chi Fang, Takeo Kanade, Tai-hoon Kim, Josef Kittler, Dominik Slezak
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
5.

電子ブック

EB
Dominik; Arslan, Tughrul; Fang, Wai Chi Slezak, Tughrul Arslan, Wai-chi Fang, Tai-hoon Kim, Dominik Slezak, Xiaofeng Song
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
The Weighting Analysis of Influence Factor in Clinical Skin Physiology Assessment via Rough Set Method / Hui-Yi Liang ; Ya-Ting Lee ; Mei-Li You ; Kun-Li Wen
Identifying Candidate Disease Gene GAD2 for Obesity by Computational Gene Prioritization Tool Endeavour / Huanping Zhang ; Xiaofeng Song ; Huinan Wang
A Novel Suppression Operator Used in optaiNet / Jungan Chen ; Feng Liang ; Wenxin Chen
Principal Subspace Analysis Based BCG Artifact Removal in Single Channel EEG Signal Measured Inside MRI Scanner / Tahir Rasheed ; Young-Koo Lee ; Sungyoung Lee
Genetical Analysis of Ascochyta Blight Resistance in Chickpea / Alireza Taleei ; Homayoun Kanouni ; Michael Baum
A Pmma Micro-suction Tool for Capsular Endoscope Using a Solid Chemical Propellant / Ho-soo Park ; Kyo-in Koo ; Sang-min Lee ; Jae-won Ban ; Hyo-young Jeong ; Dong-il Cho
Statistical Analysis of Hippocampus Shape Using a Modified Mann-Whitney-Wilcoxon Test / Nikhil Ram Mohan ; Carey Priebe ; Youngser Park ; Majnu John
QTL Mapping for Forage Quality-Related Traits in Barley / Barat Ali Siahsar ; Seyed Ali Peighambari
Fluorimetric Determination of L-3-Hydroxybutyrate Concentrations in the Serum of Normal and Aristolochic Acid-Treated Mice / Chien-Ming Chen ; Yih-Huei Uen ; Chen-Yi Kuo ; Tzu-Chuan Huang ; Jen-Ai Lee
Designing a Column-Switching High-Performance Liquid Chromatograph System for Enantiomeric Separation of Mouse Urinary D, L-Lactate / Chi-Fu Yen
A New Approach for Veins Detection / Dana Lodrová ; Radim Dvořák ; Martin Drahanský ; Filip Orság
An Analysis of Social Guarantees for Context Based Applications / Juanita Pedraza ; Miguel A. Patricio ; Agustin De Asís ; Jose M. Molina
Data Warehouse Approach to Build a Decision-Support Platform for Orthopedics Based on Clinical and Academic Requirements / Sheng-Hui Lin ; Yuan-Chii G. Lee ; Chien-Yeh Hsu
Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding) / Maqsood Mahmud ; Muhammad Khurram Khan ; Khaled Alghathbar
DNA Microarray Classification Using Single Hidden-Layer Feedforward Networks Trained by SVD / Hieu Trung Huynh ; Jung-Ja Kim ; Yonggwan Won
The Relationship Analysis of Skin Physiology Factors via Grey Theory / Chian-Song Chiu
Advanced Information and Computational Technology for Biomedical Researches (Special Session)
Advanced Analysis Information Architecture for Dosage Evaluation of Morphine Combining Adjunct / Hsiao-Hsien Rau ; Wei-Tse Tang
DICOM-Based Multi-Center Electronic Medical Records Management System to Support Clinical Diagnosis / Jui-Hung Kao ; Yu-Ping Sung
Knowledge Management on the Novel Lage-Like GlcNAc-Transferase Protein Family / Kuo-yuan Hwa ; Wan-Man Lin ; Ghueh-Pai Lee ; Mei-Yu Chen
Phylogenetic Analysis of HA Proteins of Influenza Virus H1N1 Reveal New Insight on Virus Pandemic
Author Index
The Weighting Analysis of Influence Factor in Clinical Skin Physiology Assessment via Rough Set Method / Hui-Yi Liang ; Ya-Ting Lee ; Mei-Li You ; Kun-Li Wen
Identifying Candidate Disease Gene GAD2 for Obesity by Computational Gene Prioritization Tool Endeavour / Huanping Zhang ; Xiaofeng Song ; Huinan Wang
A Novel Suppression Operator Used in optaiNet / Jungan Chen ; Feng Liang ; Wenxin Chen
6.

電子ブック

EB
Dominik; Ma, Jianhua; Sandnes, Frode Eika ; Gu, Bongen Slezak, Wai-chi Fang, Bongen Gu, Byeong-Ho Kang, Tai-Hoon Kim, Jianhua Ma, Frode Eika Sandnes, Dominik Slezak
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
7.

電子ブック

EB
Dominik; Fang, Wai-Chi Slezak, Kirk P. Arnett, Wai-chi Fang, Tai-Hoon Kim, Dominik Slezak
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Applications of Reversible Data Hiding Techniques with the Quick Response Codes / Hsiang-Cheh Huang ; Feng-Cheng Chang ; Wai-Chi Fang
A New Approach in T-FA Authentication with OTP Using Mobile Phone / Abdulaziz S. Almazyad ; Yasir Ahmad
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows / Seyed Hossein Ahmadinejad ; Saeed Jalili
A Study on Secure Contents Using in Urban Computing / Hoon Ko ; Jongmyung Choi ; Carlos Ramos
Shadow Generation Protocol in Linguistic Threshold Schemes / Marek R. Ogiela ; Urszula Ogiela
Analysis of Handwritten Signature Image / Debnath Bhattacharyya ; Poulami Das ; Samir Kumar Bandyopadhyay ; Tai-hoon Kim
The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device / Bo-heung Chung ; Min-ho Han ; Ki-young Kim
Hardware Based Data Inspection for USB Data Leakage Prevention / DongHo Kang ; BoHeung Jung ; KiYoung Kim
Grayscale Image Classification Using Supervised Chromosome Clustering
Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models / Linda Ariani Gunawan ; Peter Herrmann ; Frank Alexander Kraemer
Impact of Malicious Node on Broadcast Schemes / Aneel Rahim ; Fahad bin Muyaha
Hierarchical Identity-Based Identification Schemes / Ji-Jian Chin ; Swee-Huay Heng ; Bok-Min Goi
The Trend of the Security Research for the Insider Cyber Threat / Jaeseung Hong ; Jongwung Kim ; Jeonghun Cho
MIMO Wiretap Channel: A Scalar Approach / Mohammad Rakibul Islam ; Jinsang Kim
Security Testing for Operating System and Its System Calls / Gaoshou Zhai ; Hanhui Niu ; Na Yang ; Minli Tian ; Chengyu Liu ; Hengsheng Yang
Efficient Group Signature with Forward Secure Revocation / Haimin Jin ; Duncan S. Wong ; Yinlong Xu
Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion / Jieren Cheng ; Jianping Yin ; Yun Liu ; Zhiping Cai ; Chengkun Wu
Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code / Tie-Ming Liu ; Lie-hui Jiang ; Hong-qi He ; Ji-zhong Li ; Xian Yu
Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code / Yonglong Wei ; Xiaojuan Zheng ; Jinglei Ren ; Xudong Zheng ; Chen Sun ; Zhenhao Li
Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's Caricature / Dakshina Ranjan Kisku ; Phalguni Gupta ; Jamuna Kanta Sing
A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network / Seokung Yoon ; Hyuncheol Jung ; Kyung-Seok Lee
DDoS Attack Detection Using Three-State Partition Baaed on Flow Interaction / Boyun Zhang
A Development of Finite State Machine Create Tool for Cryptography Module Validation / Jae-goo Jeong ; Seung-yong Hur ; Gang-Soo Lee
A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments / Yuan Tian ; Biao Song ; Eui-Nam Huh
Fusion of Multiple Matchers Using SVM for Offline Signature Identification / Phalgum Gupta
A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card / Sheikh Ziauddin
Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors / Peter Pecho ; Jan Nagy ; Petr Hanáček ; Martin Drahanský
Accelerometer Based Digital Video Stabilization for Security Surveillance Systems / Filip Orság ; Pair Hanáček
Escrowed Deniable Identification Schemes / Pairat Thorncharoensri ; Qiong Huang ; Willy Susilo ; Man Ho Au ; Yi Mu ; Duncan Wong
Insights into Malware Detection and Prevention on Mobile Phones / Qiang Yan ; Yingjiu Li ; Tieyan Li ; Robert Deng
Automation of Post-exploitation: Focused on MS-Windows Targets / Mohammad Tabatabai Irani ; Edgar R. Weippl
Speaker Dependent Frequency Cepstrum Coefficients
Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection / David A. Carvalho ; Manuela Pereira ; Mário M. Freire
A Simple Encryption Scheme for Binary Elliptic Curves / Brian King
Analysis of Text Complexity in a Crypto System - A Case Study on Telugu / M.S.V.S. Bhadri Raju ; B. Vishnu Vardhan ; G.A. Naidu ; L. Pratap Reddy ; A. Vinaya Babu
Symmetric-Key Encryption for Wireless Internet SCADA / Rosslin John Robles ; Min-Kyu Choi
An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU / En Zhu
Author Index
Applications of Reversible Data Hiding Techniques with the Quick Response Codes / Hsiang-Cheh Huang ; Feng-Cheng Chang ; Wai-Chi Fang
A New Approach in T-FA Authentication with OTP Using Mobile Phone / Abdulaziz S. Almazyad ; Yasir Ahmad
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows / Seyed Hossein Ahmadinejad ; Saeed Jalili
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼