Showing results 3 to 22 of 50
< previous
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
BTM - An automated rule-based BT monitoring system for piracy detection Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007 | 2007 | 153 | ||
The chi-square test when the expected frequencies are less than 5 Proceeding/Conference:Proceedings of the COMPSTAT 2006, 17th Symposium of IASC | 2006 | 110 | ||
Conferences in Research and Practice in Information Series(Proceedings of the 27th Australasian Computer Science Conference) Proceeding/Conference:Tuning the collision test for power | 2004 | 73 | ||
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII Proceeding/Conference:Proceedings of The 6th Conference on Computerisation of Law via the Internet | 2004 | 102 | ||
Cryptanalysis of Harn digital multisignature scheme with distinguished signing authorities Journal:Electronics Letters | 2000 | 164 | ||
Delegation of Signing and Decryption Rights using PKI Proxy Memo Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering | 2004 | 78 | ||
Design of a Cyber Forensic Tool Proceeding/Conference:International Transnational Organized Crime Conference | 2002 | 85 | ||
The Differential Analysis of Reduced Skijack Variants from The First Round Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference | 2002 | 111 | ||
Digital evidence search kit Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering | 2005 | 141 | ||
1989 | 114 | |||
An efficient shadow algorithm for area light sources using BSP trees Proceeding/Conference:Proceedings of Pacific Graphics 98 | 1998 | 91 | ||
Efficiently rendering large volume data using texture mapping hardware Proceeding/Conference:Joint EUROGRAPHICS - IEEE TCCG Symposium on Visualization Proceedings | 1999 | 87 | ||
Evaluating Kolmogorov's distribution Journal:Journal of Statistical Software | 2003 | 130 | ||
Evaluating the CDF of the Kolmogorov statistic for normality testing Proceeding/Conference:COMPSTAT Symposium | 2004 | 81 | ||
Fast generation of discrete random variables Journal:Journal of Statistical Software | 2004 | 102 | ||
Finding motifs for insufficient number of sequences with strong binding to transcription factor Proceeding/Conference:RECOMB 2004 - Proceedings of the Eighth Annual International Conference on Research in Computational Molecular Biology | 2004 | 84 | ||
Finding motifs with insufficient number of strong binding sites Journal:Journal of Computational Biology | 2005 | 113 | ||
A hybrid approach for authenticating MPEG-2 streaming data Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | 120 | ||
IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks Proceeding/Conference:Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN | 2004 | 114 | ||
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC | 2005 | 121 |