Browsing by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 124  next >
TitleAuthor(s)Issue DateViews
 
A 3D face reconstruction approach in enhancing the robustness and accuracy of face recognition
Proceeding/Conference:Shanghai and Hong Kong Symposium on Science and Technology
2009
83
 
A Bag-of-Gait Model for Gait Recognition
Proceeding/Conference:Proceedings of the 2012 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2012
2012
13
 
A privacy-preserving encryption scheme for an internet real-name registration system
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
37
 
A topic model for building fine-grained domain-specific emotion lexicon
Proceeding/Conference:Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Short Papers)
2014
29
 
Airport counter allocation using constraint logic programming
Proceeding/Conference:Proceedings of the third international conference on practical application of constraint technology
1997
43
 
An information extraction framework for forensic investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
27
 
An Integrated Audio Forensic Framework For Instant Message Investigation
Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL)
2015
33
 
Analysis of the digital evidence presented in the Yahoo! case
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2009
74
An analysis of the Green Dam Youth Escort software
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2010
87
 
Analyzing storage media of digital camera
Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009
2009
83
 
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme
Journal:International Journal of Network Security
2007
68
 
Authorship attribution for forensic investigation with thousands of authors
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2014
24
Automatic 3D face texture mapping framework from single image
Proceeding/Conference:Proceedings of the 1st International Conference on Internet Multimedia Computing and Service, ICIMCS'09
2009
135
Automatic online monitoring and data-mining internet forums
Proceeding/Conference:Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011
2011
112
BTM - An automated rule-based BT monitoring system for piracy detection
Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007
2007
69
 
Challenges to Personal Data Protection in Cloud Computing
Journal:Journal of Law & Economic Regulation
2013
115
 
Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in Cloud
Proceeding/Conference:Conference on Digital Forensics, Security, and Law
2012
44
 
A complexity based model for quantifying forensic evidential probabilities
Proceeding/Conference:Proceedings of the International Conference on Availability, Reliability and Security
2010
71
 
2004
35
Consistency Issue on Live Systems Forensics
Proceeding/Conference:Proceedings of Future Generation Communication and Networking, FGCN 2007
2007
38