Browsing by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 77 to 96 of 143 < previous   next >
TitleAuthor(s)Issue DateViews
 
2011
102
 
Knowledge-based system for rostering
Journal:Expert Systems With Applications
1993
108
 
LCCT: a semisupervised model for sentiment classification
Proceeding/Conference:Human Language Technologies: The 2015 Annual Conference of the North American Chapter of the ACL
2015
106
 
Learning domain-specific sentiment lexicon with supervised sentiment-aware LDA
Proceeding/Conference:Frontiers in Artificial Intelligence and Applications
2014
58
 
Maintaining hard disk integrity with digital legal professional privilege (LPP) data
Journal:IEEE Transactions on Information Forensics and Security
2013
76
 
Memory acquisition: A 2-Take approach
Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009
2009
 
A model for foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2009
 
2014
162
 
Motion and edge adaptive interpolation de-interlacing algorithm
Proceeding/Conference:Proceedings of the 10th WSEAS International Conference on Computers
2006
79
Motion estimation method for blurred videos and application of deblurring with spatially varying blur kernels
Proceeding/Conference:Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010
2010
 
New differential cryptanalytic results for reduced-round CAST-128
Journal:IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
2010
582
The next generation for the forensic extraction of electronic evidence from mobile telephones
Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)
2013
A Novel Object Segmentation Method for Silhouette Tracker in Video Surveillance Application
Proceeding/Conference:International Conference on Computational Science and Computational Intelligence Proceedings
2014
50
 
2007
135
 
Photo forensics on shanzhai mobile phone
Proceeding/Conference:Lecture Notes in Computer Science
2013
 
PLC Forensics Based On Control Program Logic Change Detection
Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL)
2015
125
 
2006
359
Privacy preserving confidential forensic investigation for shared or remote servers
Proceeding/Conference:Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011
2011
160
Privacy preserving multiple keyword search for confidential investigation of remote forensics
Proceeding/Conference:Proceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011
2011
131
Privacy reference monitor - A computer model for law compliant privacy protection
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2009