Katalog
No. Katalog | Katalog | Subjek | Actions |
---|---|---|---|
173331 results (page 10992/17334) | |||
![]()
14.44.4372 |
IEEE Transactions Information Forensics And Security : Vol. 9, No. 7 - 8, July - August 2014 tersedia 0 koleksi total 1 koleksi |
FORENSIC COMPUTER
Information Forensic and Security
1. A Dynamic matching algorithm for audio timestamp identification using the ENF criterion.
2. On recognizing faces in videos using clustering-based re-ranking and fusion.
3. On a mathematical model for low-rate shrew..selengkapnya..
|
|
![]()
15.44.257 |
IEEE Transactions Information Forensics And Security : Vol. 8, No. 3-4, March-April 2013 tersedia 0 koleksi total 1 koleksi |
FORENSIC COMPUTER
Information Forensic and Security
1. Unreconciled Collicions Uncover Cloning Attacks in Anonymous RFFID Systems / Kai Bu, et al.
2. Increasing Security Degree of Freedom in Multiuser and Multieve Systems / Kun Xie, Wen Chen,..selengkapnya..
|
|
![]()
15.44.258 |
IEEE Transactions Information Forensics And Security: Vol. 8, No. 9-10, September-October 2013 tersedia 0 koleksi total 1 koleksi |
FORENSIC COMPUTER
Information Forensic and Security
1. "Seeing" ENNF: power-signature-based timestamp for digital multimedia via optical sensing and signal processing / Ravi Garg, et al.
2. Analysis of Reusability of Secure Sketches and Fuzzy Extractors / Marina..selengkapnya..
|
|
![]()
15.44.259 |
IEEE Transactions Information Forensics And Security : Vol. 8, No. 1 - 2, January - February 2013 tersedia 0 koleksi total 2 koleksi |
FORENSIC COMPUTER
Information Forensic and Security
1. Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions / Jun Zhang, et al.
2. User Authentication Through Mouse Dynamics / Chao Shen, et al.
3. Latent Fingerprint Matching Using Descriptor-Based..selengkapnya..
|
|
![]()
15.44.260 |
IEEE Transactions Information Forensics And Security :Vol. 8, No. 7-8, July-August 2013 tersedia 0 koleksi total 1 koleksi |
FORENSIC COMPUTER
Information Forensic and Security
1. Uncoordinated Cooperative Jamming for Secret Communications / Shuangyu Luo, Jiangyuan Li, Athina P. Petropulu
2. A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification / Xiaolong Li, et..selengkapnya..
|
|
![]()
15.44.261 |
IEEE Transactions Information Forensics And Security : Vol. 8, No. 11-12, November-December 2013 tersedia 0 koleksi total 1 koleksi |
FORENSIC COMPUTER
Information Forensic and Security
1. Compact Video Fingerprinting via Structural Graphical Models / Mu Li, Vishal Monga
2. Quantitative Intellectual Property Protection Using Physical-Level Characterization / Sheng Wei, Ani Nahapetian, Miodrag Potkonjak
3. SmokeGrenade: an efficient..selengkapnya..
|
|
![]()
15.44.262 |
IEEE Transactions Information Forensics And Security: Vol. 9, No. 1-2, January - February 2014 tersedia 0 koleksi total 1 koleksi |
FORENSIC COMPUTER
Information Forensic and Security
1. Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs / Xixiang Lv, Yi Mu, Hui Li
2. Gabor Ordinal Measures for Face Recognition / Zhenhua Chai, et al.
3. Building..selengkapnya..
|
|
![]()
15.01.2328 |
Mobile User Experience: Patterns to Make Sense of it All tersedia 1 koleksi total 1 koleksi |
MOBILE COMPUTING
USER INTERFACES,
This is your must-have resource to the theoretical and practical concepts of mobile UX. You’ll learn about the concepts and how to apply them in real-world scenarios. Throughout the book,..selengkapnya..
|
|
![]()
15.01.2327 |
The Best of the Best Fifty Years of Communications and Networking Research tersedia 1 koleksi total 1 koleksi |
COMMUNICATIONS NETWORKS
Computer networks-Research.
The Best of the Best: Fifty Years of Communications and Networking Research consists of a group of 50 papers selected as the best published by ComSoc in its various journals..selengkapnya..
|
|
![]()
15.01.2324 |
Deteksi Cepat Kondisi Keuangan: 7 Analisis Rasio Keuangan tersedia 1 koleksi total 1 koleksi |
FINANCIAL RATIOS-FINANCIAL REPORTS
Buku pertama ditujukan untuk mereka yang baru pertama kali belajar memahami laporan keuangan. Buku kedua untuk mereka yang sudah memahami laporan keuangan dan ingin memperdalam pengetahuannya tentang laporan keuangan. Pada..selengkapnya..
|
|