Browsing by Author rp00179

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 3 to 22 of 50 < previous   next >
TitleAuthor(s)Issue DateViews
BTM - An automated rule-based BT monitoring system for piracy detection
Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007
2007
153
 
The chi-square test when the expected frequencies are less than 5
Proceeding/Conference:Proceedings of the COMPSTAT 2006, 17th Symposium of IASC
2006
110
 
2004
73
 
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII
Proceeding/Conference:Proceedings of The 6th Conference on Computerisation of Law via the Internet
2004
102
 
2000
164
 
Delegation of Signing and Decryption Rights using PKI Proxy Memo
Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering
2004
78
 
Design of a Cyber Forensic Tool
Proceeding/Conference:International Transnational Organized Crime Conference
2002
85
 
The Differential Analysis of Reduced Skijack Variants from The First Round
Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference
2002
111
 
Digital evidence search kit
Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering
2005
141
 
1989
114
 
An efficient shadow algorithm for area light sources using BSP trees
Proceeding/Conference:Proceedings of Pacific Graphics 98
1998
91
 
Efficiently rendering large volume data using texture mapping hardware
Proceeding/Conference:Joint EUROGRAPHICS - IEEE TCCG Symposium on Visualization Proceedings
1999
87
 
Evaluating Kolmogorov's distribution
Journal:Journal of Statistical Software
2003
130
 
2004
81
 
Fast generation of discrete random variables
Journal:Journal of Statistical Software
2004
102
Finding motifs for insufficient number of sequences with strong binding to transcription factor
Proceeding/Conference:RECOMB 2004 - Proceedings of the Eighth Annual International Conference on Research in Computational Molecular Biology
2004
84
 
2005
113
A hybrid approach for authenticating MPEG-2 streaming data
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
120
IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks
Proceeding/Conference:Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN
2004
114
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication
Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC
2005
121