Your search for 37626 returns 6726 document(s) |
Counterarcting phishing page polymorphims: an image layout analysis appraoch, (LNCS-Lecture Notes in Computer Science 5576) Hal. 270-279 |
Author: Ieng-Fat Lam; Wei-Cheng Xino; Szu-Chi Wang; Kuan Ta Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A hierarchical layout analysis method for image with multi-business cards in holder, 129-133 |
Author: Rui-shui Dong, Hong-yang Ge, Sheng-ke Wang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Energy analysis of multimedia video streaming on mobile devices, (LNCS-Lecture Notes in Computer Science 5576) Hal. 347-357 |
Author: Chu-Hsing LIn; Jung-Chun Liu; Mao-Hua Cheng; Tsung-Che Yang; Mei-Chun Chou; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A study of international trend analysis on web service vulnerabilities in OWASP and WASC, (LNCS-Lecture Notes in Computer Science 5576) Hal 788-796 |
Author: Soonseok Kim; Haeyoung Han; Donghwi Shin; Inkyung Jeun; HyunCheol Jeong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Recognizing partially occluded faces from a sungle exemplar image per person, (LNCS-Lecture Notes in Computer Science 5576) Hal. 100-109 |
Author: Hamidreza Rashidy Kanan; M. Shhram Moin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Parameter-free geometric document layout analysis, page 1240 |
Author: S-W. Lee and D.S. Ryu | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Performance analysis of digital secure voice transmission over HF radio channel, (LNCS-Lecture Notes in Computer Science 5576) Hal. 337-346 |
Author: Kihong Kim; Jinkeun Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691 |
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701 |
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Content-based image retrieval using a composite color-shape appraoch, page 109 |
Author: Babu M.M. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|