<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Auralization of sonic crystals through simulation of acoustic band gaps in two-dimensional periodic scattering arrays
2
Auralization of streamline vorticity in computational fluid dynamics data
3
AuRA-NMS: A substation automation project for a potential smart grid
4
AuRA-NMS: An autonomous regional active network management system for EDF energy and SP energy networks
5
AuRA-NMS: Towards the delivery of smarter distribution networks through the application of multi-agent systems technology
6
AURASOFT, the first truly natural and controllable softlight
7
AURED Autonomous Random Early Detection for TCP Congestion Control
8
AuResS: The audience response system
9
Auriga2, a 4,7 Million Transistor CISC Processor for a High-End Mainframe
10
Auriga2: a 4.7 million-transistor CISC microprocessor
11
AUROGRID PRO
12
Aurora image denoising with a modified bidimensional empirical mode decomposition method
13
Aurora in a Bottle
14
Aurora Synchronization Improvement
15
Aurora Test Cell Electron Beam Environment - Response of Large Loop
16
Aurora, An Electron Accelerator
17
Aurora: A Cross-Layer Solution for Thermally Resilient Photonic Network-on-Chip
18
Aurora: A software framework for all-optical network design and analysis
19
Aurora: A thermally resilient photonic network-on-chip architecture
20
AURORA: A unique flexible approach to automatic telephone service
21
AURORA: a vision-based roadway departure warning system
22
Aurora: Adaptive Block Replication in Distributed File Systems
23
Aurora: An Approach to High Throughput Parallel Simulation
24
AURORA: AUtomatic RObustness coveRage Analysis Tool
25
Aurora: scoped behaviour for per-context optimized distributed data sharing
26
Auroral absorption effects on a transpolar synchronized step-frequency circuit
27
Auroral absorption of HF radio waves in the ionosphere: A review of results from the first decade of riometry
28
Auroral and polar-cap ionospheric effects on radio propagation
29
Auroral breakup during substorm onsets
30
Auroral clutter observations with a three-dimensional over-the-horizon radar
31
Auroral cyclotron emission mechanisms demonstrated in the laboratory
32
Auroral Formation and Plasma Interaction Between Magnetized Objects Simulated With the Planeterrella
33
Auroral Ionization and Magnetic Disturbances
34
Auroral optical observations of plasma processes
35
Auroral Phenomena
36
Auroral scintillation characteristics using 100 Hz sampling of global positioning system satellite signals
37
Auroral Sequence Representation and Classification Using Hidden Markov Models
38
Auroral Spatial Structures Probe (ASSP)
39
Auroral-E mode oblique HF propagation and its dependence on auroral oval position
40
AuRo-Rec: An unsupervised and Robust Sybil attack defense in online recommender systems
41
AuRoSS: An Autonomous Robotic Shelf Scanning system
42
AURUM: A Framework for Information Security Risk Management
43
AURYON - A Mechatronic UAV Project Focus on Control Experimentations
44
Au-Sb and Au-Ag-Sb alloys as low-voltage contact materials
45
Au-Sb and Au-Ag-Sb alloys as low-voltage contact materials
46
AUSB3.0-based design of high-speed data channel for Charge Coupled Devices system
47
AusCover CALVAL: Coordinating Australian activities in calibration and validation
48
Auscultation based stethoscopic diagnostic device for cardiac murmur identification
49
Auscultation Signals Analysis in Traditional Chinese Medicine Using Wavelet Packet Energy Entropy and Support Vector Machines
50
Auscultatory Blood Pressure Measurement using HMMs
51
Au-silica core/shell hybrid nanoparticles furnished with CdTe nanocrystals for enhanced plasmon-exciton interactions
52
Au-Sn bonding metallurgy of TAB contacts and its influence on the Kirkendall effect in the ternary Cu-Au-Sn
53
Au-Sn bonding metallurgy of TAB contacts and its influence on the Kirkendall effect in the ternary Cu-Au-Sn system
54
Au-Sn co-electroplating solution for flip chip-LED bumps
55
Au-Sn fluxless SLID bonding: Effect of bonding temperature for stability at high temperature, above 400 °C
56
Au-Sn microsoldering on flexible circuit
57
AuSn solder in photonics assembly
58
AUSN solder vacuum packaging using melted solder floodgates and laser-activated non-evaporable getters for SIC diaphragm anticorrosive vacuum sensors
59
Au-Sn Transient Liquid Phase bonding for hermetic sealing and getter activation
60
Au-solid-state potentiometric sensor for iodide based on the oil dispersion of mixed AgI/Ag
2
S salts
61
AUSPICE-an expert system to assist simulations with SPICE
62
Auspicious computing?
63
AusPlots Rangelands Field Data Collection and Publication: Infrastructure for Ecological Monitoring
64
AUSS (Advanced unmanned search system)
65
AusTalk — The Australian speech database: Design framework, recording experience and localisation
66
AUSTERE: a system for AUtomated STandard softwarE REview
67
Austian phone boxes get facelift
68
Austin Bailey
69
Austin Energy Builds Stronger Distribution System , Cost Effectively, with Steel Poles
70
Austin IES Members Visit Pecan Street Labs [Chapter News]
71
Austin rover leads car makers towards ´total automation´
72
Austin Rover´s future
73
Austin rover´s speech based quality assurance system
74
Austin V. Eastman, Regional Director, 1950-1951
75
AUSTIN: A Tool for Search Based Software Testing for the C Language and Its Evaluation on Deployed Automotive Systems
76
Austin-travis county health department´s information system
77
Australasia as seen by an engineer
78
Australia 2000 AD
79
Australia and the war
80
Australia on track for ethanol fuel cell
81
Australia on track for ethanol fuel cell
82
Australia uses genre analysis to address workplace literacy
83
Australia: raising the E-commerce comfort level
84
Australia´s (less super) superhighway
85
Australia´s electricity beyond 2020
86
Australia´s energy options
87
Australia´s Integrated Marine Observing System observation methods and technology review
88
Australia´s national genomic information system
89
Australia´s National Genomic Information system, ANGIS
90
Australia´s National Measurement System
91
Australian Accent-Based Speaker Classification
92
Australian activities in microwave links for wireless LANs
93
Australian All Ordinaries Index: re-examine the utilities of the explanatory variables using three different measures
94
Australian commission tours United States
95
Australian currency note identifier for the vision impaired: Part I hardware description
96
Australian currency note identifier for the vision impaired: Part II software description
97
Australian defence standard for Bayesian reliability demonstration
98
Australian developments on tracking in a cluttered environment
99
Australian Electricity Market
100
Australian electricity market power analysis under potential emission trading scheme
101
Australian experiences with designing and implementing e-commerce degrees
102
Australian facility for the calibration of precision harmonics and flicker meters
103
Australian Government
104
Australian IV prototypes and field trials
105
Australian Marine Pollution Monitoring Programs
106
Australian millimetre-wave MMIC technology for wideband telecommunication systems
107
Australian MMIC prototyping in the 40, 60 and 90 GHz bands
108
Australian national EMC symposium 2011
109
Australian national pulsed magnet laboratory for condensed matter physics research
110
Australian Ocean Data Network (AODN) "Publicly Funded Data, Publicly Available"
111
Australian Organising Committee
112
Australian perspective
113
Australian perspectives on waterside security
114
Australian photovoltaic research and development
115
Australian Preperations For The Polar Platform
116
Australian radio telescope
117
Australian SKA Pathfinder: A High-Dynamic Range Wide-Field of View Survey Telescope
118
Australian SKA Pathfinder: Digital signal processing implementation and early engineering test array results
119
Australian Snowy Mountains Hydro Scheme earthing system safety assessment
120
Australian software development: what software project management practices lead to success?
121
Australian Software Engineering Conference - Copyright
122
Australian Software Engineering Conference - Table of contents
123
Australian Software Engineering Conference - Title
124
Austrian Electrotechnical Association
125
Austrian Grid: Overview on the Project with Focus on Parallel Applications
126
Austrian pacemaker registry: improving reporting compliance in 60 center national registry
127
Austrian railway electrification
128
AU-SWCNTS-HF Schottky diodes fabricated by dielectrophoresis
129
AUT SOA governance: A new SOA governance framework based on COBIT
130
AUT-a dynamic tool for traffic control and supervision
131
Autentification of Text Documents Using Digital Watermarking
132
Authalic Parameterization of General Surfaces Using Lie Advection
133
Authentic and confidential policy distribution in software defined wireless network
134
Authentic and group learning technology using computer networks and intelligent tutors
135
Authentic assessment for Fundamental Electronics
136
Authentic assessment in Software Engineering education based on PBL principles a case study in the telecom market
137
Authentic assessment using a research conference format
138
Authentic facial expression analysis
139
Authentic leadership and organizational citizenship behavior
140
Authentic learning in network and security with portable labs
141
Authentic learning of mobile security with case studies
142
Authentic Learning Strategies to Engage Student´s Creative and Critical Thinking
143
Authentic modeling of complex dynamics of biological systems by the manipulation of artificial intelligence
144
Authentic mode-toggled detector with fast transient response under wide load range buck-boost converter
145
Authentic publication of XML document data
146
Authentic query dissemination and data aggregation in WSN
147
Authentic simulation studies of periodic adaptive learning compensation of cogging effect in PMSM position servo system
148
Authentic: Computerized Brushstroke Analysis
149
Authenticaiton Mechanisms for Call Control Message Integrity and Origin Verification
150
Authenticated access for IPv6 supported mobility
151
Authenticated Asymmetric Group Key Agreement Protocol and Its Application
152
Authenticated autonomous system traceback
153
Authenticated binding update in Mobile IPv6 networks
154
Authenticated Broadcast Encryption Scheme
155
Authenticated broadcast encryption with short ciphertexts and private keys
156
Authenticated data
157
Authenticated data compression in delay tolerant wireless sensor networks
158
Authenticated data transmission technique for clustered wireless sensor network
159
Authenticated Deterministic Secure Quantum Communication Based on Entanglement Swapping
160
Authenticated Dictionary-Based Attribute Sharing in Federated Identity Management
161
Authenticated Diffie-Hellman key agreement protocol using a single cryptographic assumption
162
Authenticated distributed device network
163
Authenticated down-sampling for privacy-preserving energy usage data sharing
164
Authenticated encryption and steganography in unconditional security setting
165
Authenticated encryption scheme based on quadratic residue
166
Authenticated encryption scheme with (t, n) shared verification
167
Authenticated encryption scheme without using a one way function
168
Authenticated encryption schemes with low communication costs
169
Authenticated encryption schemes with message linkage for threshold signatures
170
Authenticated Encryption: Toward Next-Generation Algorithms
171
Authenticated flooding in large-scale sensor networks
172
Authenticated Group Key Agreement Against DoS in Heterogeneous Wireless Networks
173
Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks
174
Authenticated Group Key Distribution for Unreliable Sensor Networks
175
Authenticated group key distribution scheme for a large distributed network
176
Authenticated Group Key Transfer Protocol Based on Secret Sharing
177
Authenticated key agreement algorithm for conference establishment in 3G mobile network
178
Authenticated key agreement and cluster head selection for Wireless Body Area Networks
179
Authenticated key agreement protocol for virtual private network based on certificateless cryptography
180
Authenticated key agreement without using one-way hash functions
181
Authenticated key distribution and secure broadcast using no conventional encryption: a unified approach based on block codes
182
Authenticated key distribution protocol in universal network
183
Authenticated Key Establishment Protocols for a Home Health Care System
184
Authenticated key exchange for wireless security
185
Authenticated key exchange protocol using neural cryptography with secret boundaries
186
Authenticated key exchange protocols resistant to password guessing attacks
187
Authenticated key exchange with group support for wireless sensor networks
188
Authenticated Key Transport Protocol Based on a Locking-Signing Technique
189
Authenticated Key-Exchange Scheme Based on SGC-PKE for P2PSIP
190
Authenticated location in wireless mesh networks
191
Authenticated mobile groups to secure the backhaul: A new paradigm and challenges
192
Authenticated Modbus Protocol for Critical Infrastructure Protection
193
Authenticated multiparty secret key sharing using quantum entanglement swapping
194
Authenticated Multiple Keys Exchange Protocol Based on Bilinear Pairings
195
Authenticated Multistep Nearest Neighbor Search
196
Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution
197
Authenticated public-key distribution over WLAN/cellular dual networks
198
Authenticated public-key encryption based on elliptic curve
199
Authenticated Quantum Secure Direct Communication with Qutrits
200
Authenticated query flooding in sensor networks
201
Authenticated resource management in delay-tolerant networks using proxy signatures
202
Authenticated routing for ad hoc networks
203
Authenticated routing of table driven protocol in an ad-hoc environment
204
Authenticated secure bio-metric based access to the bank safety lockers
205
Authenticated secure communications in mobile ad hoc networks
206
Authenticated Secure Group Communication using Broadcast Encryption Key Computation
207
Authenticated service interaction protocol for Multi-Agent System
208
Authenticated Setup of Virtual Links with Quality-of-Service Guarantees
209
Authenticated spectrum sharing for secondary users in cognitive radio networks
210
Authenticated stateful auto-configuration for Mobile IPv6 based on pre-IP access control
211
Authenticated Subgraph Similarity Searchin Outsourced Graph Databases
212
Authenticated symmetric key distribution for mobile ad hoc networks
213
Authenticated system calls
214
Authenticated Top-K Aggregation in Distributed and Outsourced Databases
215
Authenticated tracking and monitoring system (ATMS) tracking shipments from an Australian uranium mine
216
Authenticated Tree Based Group Key Agreement
217
Authenticated voltage control of partitioned power networks with optimal allocation of STATCOM using heuristic algorithm
218
Authenticated wireless image sensor secret network - Graph guided steganography
219
Authenticating a mobile device´s location using voice signatures
220
Authenticating airline passengers
221
Authenticating aviation augmentation system broadcasts
222
Authenticating contrast and brightness adjusted images using distributed source coding and expectation maximization
223
Authenticating corrupted face image based on noise model
224
Authenticating edges produced by zero-crossing algorithms
225
Authenticating encrypted data
226
Authenticating Feedback in Multicast Applications Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
227
Authenticating Image Metadata Elements Using Geolocation Information and Sun Direction Estimation
228
Authenticating IoT Devices with Physically Unclonable Functions Models
229
Authenticating Location-Based Skyline Queries in Arbitrary Subspaces
230
Authenticating Lossy Surveillance Video
231
Authenticating MIMO Transmissions Using Channel-Like Fingerprinting
232
Authenticating mobile agent platforms using signature chaining without trusted third parties
233
Authenticating Mobile Users Protocol in Wireless Networks
234
Authenticating multicast Internet electronic mail messages using a bidirectional MAC is insecure
235
Authenticating Multimedia Transmitted Over Wireless Networks: A Content-Aware Stream-Level Approach
236
Authenticating network attached storage
237
Authenticating Primary Users´ Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures
238
Authenticating Public Wireless Networks with Physical Evidence
239
Authenticating query results in edge computing
240
Authenticating real time packet streams and multicasts
241
Authenticating Strangers in Fast Mixing Online Social Networks
242
Authenticating student work in an e-learning programme via speaker recognition
243
Authenticating Super-Resolved Image and Enhancing Its PSNR Using Watermark
244
Authenticating time and frequency signals
245
Authenticating User Using Keystroke Dynamics and Finger Pressure
246
Authenticating User´s Keystroke Based on Statistical Models
247
Authenticating using secret key in digital video watermarking using 3-level DWT
248
Authenticating vehicles and drivers in motion based on computer vision and RFID tags
249
Authenticating Video Streams
250
Authenticating with Attributes in Online Social Networks
251
Authenticating with privacy protection in opportunistic networks
252
Authentication - Are We Doing Well Enough? [Guest Editors´ Introduction]
253
Authentication amplification by synchronization
254
Authentication analysis in an IPV6-based environment
255
Authentication and Access Control Agent Framework for Context-Aware Services
256
Authentication and Access Control in Satellite Network
257
Authentication and Access Control in the Internet of Things
258
Authentication and Anti-replay Security Protocol for Wireless Sensor Networks
259
Authentication and Authorisation for a Personal Distributed Environment
260
Authentication and authorisation mechanisms in support of secure access to WMN resources
261
Authentication and authorization architecture design for hybrid mesh networks
262
Authentication and authorization for Smart Grid application interfaces
263
Authentication and Authorization in the IN
264
Authentication and authorization mechanisms for substation automation in smart grid network
265
Authentication and Authorization Method in Multi-domain, Multi-provider Networks
266
Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization
267
Authentication and Authorization Service for X-SIGMA System
268
Authentication and authorization techniques in distributed systems
269
Authentication and authorization: Domain specific Role Based Access Control using Ontology
270
Authentication and authorizing scheme based on umts aka protocol for cognitive radio networks
271
Authentication and Billing Framework for Service Oriented Architecture
272
Authentication and Certificate Managements of Unauthorized Intrusion in Ad-Hoc Networks, Problems and Solutions
273
Authentication and correction of digital watermarking images
274
Authentication and digital signature USB device for telemedicine applications
275
Authentication and dynamic key management protocol based on certified tokens for manets
276
Authentication and encryption in a mobile communication system
277
Authentication and encryption in Cloud Computing
278
Authentication and enterprise secured data storage
279
Authentication and Expiration
280
Authentication and Identification Methods Used in Keystroke Biometric Systems
281
Authentication and integrity in telecommunication signaling network
282
Authentication and its privacy effects
283
Authentication and key agreement protocol for UMTS with low bandwidth consumption
284
Authentication and key agreement scheme for CDMA cellular system
285
Authentication and key distribution methods in mobile computing environments
286
Authentication and Key Establishment Scheme Based on Token for Mobile Commerce
287
Authentication and key generation for mobile IP using GSM authentication and roaming
288
Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions
289
Authentication and lightweight cryptography in low cost RFID
290
Authentication and location control via RFID analysis
291
Authentication and Micropayment Protocols based on Self-Updating Hash Chains
292
Authentication and payment protocol preserving location privacy in mobile IP
293
Authentication and Quality Monitoring based on Audio Watermark for Analog AM Shortwave Broadcasting
294
Authentication and recovery of digital images: Potential application in video surveillance and remote sensing
295
Authentication and recovery watermarking based on image content
296
Authentication and scrambling of radio frequency signals using reversible watermarking
297
Authentication and secrecy codes for equiprobable source probability distributions
298
Authentication and Secured Execution for the Infrastructure-as-a-Service Layer of the Cloud Computing Model
299
Authentication and self-correction in DNA identification based on agarose-gel images
300
Authentication and services access control in a cooperative ad hoc environment
301
Authentication and tamper detection in images using dual watermarking approach
302
Authentication and Tamper Detection of Digital Holy Quran Images
303
Authentication architecture for interworking between universal mobile telecommunications systems (UMTS) and high-speed portable internet (HPI) system
304
Authentication at Scale
305
Authentication Authorization and Accounting (AAA) Schemes in WiMAX
306
Authentication based on a changeable biometric using gesture recognition with the Kinect™
307
Authentication based on Euclidean geometry properties
308
Authentication based on secret-key generation
309
Authentication Based on Signaling Token Piggybacking
310
Authentication based on signature verification using position, velocity, acceleration and Jerk signals
311
Authentication Based QoS Using Bandwidth Limitation
312
Authentication by Biometric Verification
313
Authentication by correspondence
314
Authentication by Digital Recognition of Palmar Features
315
Authentication by name or by registration
316
Authentication codes and plaintext attack
317
Authentication confidences
318
Authentication considerations for mobile e-health applications
319
Authentication Control Point and Its Implications For Secure Processor Design
320
Authentication for distributed systems
321
Authentication for electrical charging of EVs in the private area considering E-roaming
322
Authentication for lders and isabled sing racking
323
Authentication for low power systems
324
Authentication for secure environments based on iris scanning technology
325
Authentication for two-way relay channel with Physical-Layer Network coding
326
Authentication framework of IIEDNS based on LDAP & Kerberos
327
Authentication gets personal with biometrics
328
Authentication handover and privacy protection in 5G hetnets using software-defined networking
329
Authentication in 802.11 LANs Using a Covert Side Channel
330
Authentication in a Multi-access IMS Environment
331
Authentication in a UNIX network environment using smart cards
332
Authentication in an integrated 802.1X based WLAN and CDMA2000-1X network
333
Authentication in an Internet Banking Environment; Towards Developing a Strategy for Fraud Detection
334
Authentication in computer networks and proposal of one-time increase of user permissions
335
Authentication in flat Wireless Sensor Networks with mobile nodes
336
Authentication in GPS-directed mobile clouds
337
Authentication in mobile distributed environment
338
Authentication in Peer-to-Peer Network: Survey and Research Directions
339
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
340
Authentication in Stealth Distributed Hash Tables
341
Authentication in Time-Triggered Systems Using Time-Delayed Release of Keys
342
Authentication in Transient Storage Device Attachments
343
Authentication in very large ad hoc networks using randomized groups
344
Authentication in wireless communications
345
Authentication in wireless network
346
Authentication in Wireless Networks
347
Authentication Key Exchange Protocol for IMS Network
348
Authentication mechanism for mobile RFID based Smart grid network
349
Authentication mechanism over the integrated UMTS network and WLAN platform using the cross-layer bootstrap
350
Authentication mechanism with immediate revocation in POD copy protection system
351
Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack
352
Authentication Mechanisms for Mobile Agents
353
Authentication mechanisms in grid computing environment: Comparative study
354
Authentication mechanisms in microprocessor-based local area networks
355
Authentication method against shoulder-surfing attacks using secondary channel
356
Authentication Method for 802.11S Infrastructure Mode
357
Authentication method with impersonal token cards
358
Authentication model based on reformation mapping method
359
Authentication Model of Dynamic Signatures using Global and Local Features
360
Authentication Model Using Multiple Sensors Input
361
Authentication of binary document images in PNG format based on a secret sharing technique
362
Authentication of biomedical images based on zero location watermarking
363
Authentication of Biometric Features Using Texture Coding for ID Cards
364
Authentication of cellular users through voice verification
365
Authentication of damaged hand vein patterns by modularization
366
Authentication of Data on Devices
367
Authentication of Digital Streams
368
Authentication of e-learners using multimodal biometric technology
369
Authentication of Electronic Version of the Holy Quran: An Information Security Perspective
370
Authentication of encrypted secret information in image steganography
371
Authentication of fingerprint scanners
372
Authentication of free hand drawings by pattern recognition methods
373
Authentication of identification card using watermarking
374
Authentication of images through non convoluted DCT (AINCDCT)
375
Authentication of k Nearest Neighbor Query on Road Networks
376
Authentication of lossy compressed video data by semifragile watermarking
377
Authentication of lossy data in body-sensor networks for healthcare monitoring
378
Authentication of MAV communication using Caesar Cipher cryptography
379
Authentication of mobile users
380
Authentication of mobile users in personal communication system
381
Authentication of moving kNN queries
382
Authentication of Moving Top-k Spatial Keyword Queries
383
Authentication of MPEG-4-based surveillance video
384
Authentication of Nodes among Different Symmetric Key Groups in MANETs Using 4G Technologies
385
Authentication of Offline Signatures Based on Central Tendency of Features and Dynamic Time Warping Values Preserved for Genuine Cases
386
Authentication of Online Authorship or Article Based on Hypothesis Testing Model
387
Authentication of quantum messages
388
Authentication of radiation measurement systems for nonproliferation
389
Authentication of Scalable Video Streams With Low Communication Overhead
390
Authentication of secret information in image Steganography
391
Authentication of sensor network flooding based on neighborhood cooperation
392
Authentication of Signaling in VoIP Applications
393
Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm
394
Authentication of subjects and devices using biometrics and identity management systems for persuasive mobile computing: A survey paper
395
Authentication on LDP (Label Distribution Protocol)
396
Authentication Optimization for Seamless Handovers
397
Authentication Over Noisy Channels
398
Authentication over noisy data with the use of memory containing metric functions
399
Authentication Overhead in Wireless Networks
400
Authentication personal
401
Authentication Planning for XOR Network Coding
402
Authentication platform for seamless handover in heterogeneous environments
403
Authentication procedure and Terminal switching scheme for PAN services
404
Authentication process based on the synchronization of chaotic oscillator networks
405
Authentication protocol for an ambient assisted living system
406
Authentication Protocol for Preventing Damage by Loss and Theft of Smartphone
407
Authentication protocol in fourth generation wireless networks
408
Authentication Protocol in Mobile RFID Network
409
Authentication Protocol of RFID System Based on Security Policy
410
Authentication protocol runtime evaluation in distributed AAA framework for Mobile Ad-Hoc Networks
411
Authentication Protocol Using Authorization Ticket in Mobile Network Service Environment
412
Authentication Protocol using Fuzzy Eigenface Vault based on MoC
413
Authentication Protocols for Mobile IP Networks
414
Authentication protocols for mobile network environment value-added services
415
Authentication protocols for the broadband ISDN billing system
416
Authentication protocols for wireless ATM networks
417
Authentication Protocols to Support Fast Handoff for 802.11s Mesh Networks
418
Authentication protocols with nonrepudiation services in personal communication systems
419
Authentication public terminals with smart cards
420
Authentication Scheme and Simplified CAS in Mobile Multimedia Broadcast
421
Authentication Scheme for Substation Information Security Based on Chaotic Theory
422
Authentication Scheme of DRM System for Remote Users Based on Multimodal Biometrics, Watermarking and Smart Cards
423
Authentication scheme using Walsh encoding of random patterns
424
Authentication Schemes Based on the EAP-SIM Mechanism in GSM-WLAN Heterogeneous Mobile Networks
425
Authentication schemes for third generation mobile radio systems
426
Authentication schemes for wireless sensor networks
427
Authentication Schemes from Highly Nonlinear Functions
428
Authentication services and biometrics: network security issues
429
Authentication solutions for Wireless Sensor Network based on Virtual Certificate Authority
430
Authentication system based on computer generated hologram
431
Authentication system for medical images using Hilbert numbering
432
Authentication system using behavioral biometrics through keystroke dynamics
433
Authentication technique for gray images using DCT (ATGIDCT)
434
Authentication technique to reduce call setup delay incurred due to authentication in mobiles
435
Authentication Techniques for Improving the Reliability of the Nodes in the MANET
436
Authentication technology using QZSS
437
Authentication tests
438
Authentication Tests Based on Test Type Matrix
439
Authentication theory and hypothesis testing
440
Authentication threats in PSTN-VoIP architecture using multi-service gateways
441
Authentication through keystrokes: What you type and how you type
442
Authentication Using Fuzzy Vault Based on Iris Textures
443
Authentication using graphical codes: Optimisation of the print and scan channels
444
Authentication using graphical password in cloud
445
Authentication Using Virtual Certificate Authorities: A New Security Paradigm for Wireless Sensor Networks
446
Authentication Vector Management for UMTS
447
Authentication via Ambassadors: A Novel Authentication Mechanism in MANETs
448
Authentication via localized names
449
Authentication with controlled anonymity in P2P systems
450
Authentication with distortion criteria
451
Authentication with side information
452
Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code
453
Authentication without Identification
454
Authentication, Authorization and Accounting Framework for Multicast Content Delivery
455
Authentication, Authorization and File Synchronization in Hybrid Cloud: On Case of Google Docs, Hadoop and Linux Local Hosts
456
Authentication, Authorization, and Accounting in WebRTC PaaS Infrastructures: The Case of Kurento
457
Authentication, authorization, and accounting of services in multi-hop mobile networks through rewarding
458
Authentication, authorization, and accounting real-time secondary market services
459
Authentication/Secret Message Transformation through Wavelet Transform Based Subband Image Coding (WTSIC)
460
Authentication: An overview, its types and integration with web and mobile applications
461
Authenticity analysis of wavelet approximations in visualization
462
Authenticity and Deception in an Age of Visual Wearables [Viewpoint]
463
Authenticity and integrity of digital mammography images
464
Authenticity beats eloquence
465
Authenticity by typing for security protocols
466
Authenticity in Art, the Scientific Detection of Forgery
467
Authenticity of digital records in practice
468
Authentification of person with dynamically entered signature using of normal ortogonal discrete transformation
469
Auther index
470
Auther index
471
Auth-Lite: Lightweight M2MAuthentication reinforcing DTLS for CoAP
472
Author
473
Author
474
Author
475
Author
476
Author
477
Author
478
Author
479
Author — User interaction model for OER
480
Author [index]
481
Author [Index]
482
Author [index]
483
Author addresses
484
Author affiliations
485
Author and chair index
486
Author and Educator: Shah follows her passion [Women to Watch]
487
Author and keyword indexes
488
Author and keyword indexes
489
Author and paper index
490
Author and reader in instructions for use
491
Author and session chair index
492
Author and session index
493
Author and session index
494
Author and session index
495
Author and subject index
496
Author and subject index
497
Author and subject index
498
Author and title Index
499
Author attribution on streaming data
500
Author attribution using a graph based representation
501
Author award list
502
Author biographies
503
Author biographies
504
Author Biographies
505
Author Biography & Photo
506
Author cooperation relationship in digital publishing based on social network analysis
507
Author correction
508
Author correction
509
Author correction
510
Author details
511
Author details: A
512
Author details: B
513
Author details: C
514
Author details: D
515
Author details: E
516
Author details: F
517
Author details: G
518
Author details: H
519
Author details: I
520
Author details: J
521
Author details: K
522
Author details: L
523
Author details: M
524
Author details: N
525
Author details: O
526
Author details: P
527
Author details: Q
528
Author details: R
529
Author details: S
530
Author details: T
531
Author details: U
532
Author details: V
533
Author details: W
534
Author details: X
535
Author details: Y
536
Author details: Z
537
Author detection by using different term weighting schemes
538
Author directory
539
Author directory
540
Author directory
541
Author directory
542
Author directory
543
Author directory
544
Author directory
545
Author directory
546
Author directory
547
Author directory
548
Author directory
549
Author directory
550
Author directory
551
Author directory
552
Author directory
553
Author directory
554
Author directory
555
Author Disclaimer
556
Author Disclaimer
557
Author Disclaimer
558
Author Disclaimer
559
Author Disclaimer
560
Author Disclaimer
561
Author Disclaimer
562
Author Disclaimer
563
Author Disclaimer
564
Author Disclaimer
565
Author Disclaimer
566
Author disclaimer
567
Author Disclaimer
568
Author Disclaimer
569
Author Disclaimer
570
Author Disclaimer
571
Author disclaimer
572
Author Disclaimer
573
Author Disclaimer
574
Author Disclaimer
575
Author disclaimer
576
Author Disclaimer
577
Author Disclaimer
578
Author Disclaimer
579
Author Disclaimer
580
Author Disclaimer
581
Author disclaimer
582
Author Disclaimer
583
Author disclaimer
584
Author Disclaimer
585
Author disclaimer
586
Author disclaimer
587
Author Disclaimer - Copyright page
588
Author Disclaimer. Copyright and Copying, Conditions of Acceptance of Advertisements
589
Author Domain Signing Practices (ADSP): Point and Counterpoint
590
Author entropy vs. file size in the gnome suite of applications
591
Author for IWSSC 2008
592
Author guidelines
593
Author Identification - An Experiment Based on Mongolian Literature Using Decision Trees
594
Author identification based on word distribution in word space
595
Author identification by automatic learning
596
Author identification for digitized paintings collections
597
Author Identification in Albanian Language
598
Author Identification in Imbalanced Sets of Source Code Samples
599
Author Identification of E-mail Messages with OLMAM Trained Feedforward Neural Networks
600
Author Identification of Software Source Code with Program Dependence Graphs
601
Author Identification Using Compression Models
602
Author Identification Using Imbalanced and Limited Training Texts
603
Author index
604
Author index
605
Author index
606
Author index
607
Author index
608
Author index
609
Author index
610
Author index
611
Author index
612
Author index
613
Author index
614
Author index
615
Author index
616
Author index
617
Author index
618
Author index
619
Author index
620
Author index
621
Author index
622
Author index
623
Author index
624
Author index
625
Author index
626
Author index
627
Author index
628
Author index
629
Author index
630
Author index
631
Author index
632
Author index
633
Author index
634
Author index
635
Author index
636
Author Index
637
Author index
638
Author index
639
Author index
640
Author index
641
Author index
642
Author index
643
Author index
644
Author index
645
Author index
646
Author index
647
Author index
648
Author index
649
Author index
650
Author index
651
Author index
652
Author index
653
Author index
654
Author index
655
Author index
656
Author Index
657
Author index
658
Author index
659
Author index
660
Author index
661
Author index
662
Author index
663
Author index
664
Author Index
665
Author index
666
Author index
667
Author index
668
Author index
669
Author index
670
Author index
671
Author index
672
Author index
673
Author index
674
Author index
675
Author index
676
Author Index
677
Author index
678
Author index
679
Author index
680
Author Index
681
Author index
682
Author index
683
Author index
684
Author index
685
Author index
686
Author index
687
Author index
688
Author Index
689
Author index
690
Author index
691
Author index
692
Author index
693
Author index
694
Author index
695
Author index
696
Author index
697
Author index
698
Author index
699
Author index
700
Author index
701
Author index
702
Author index
703
Author index
704
Author index
705
Author index
706
Author index
707
Author index
708
Author index
709
Author index
710
Author Index
711
Author index
712
Author index
713
Author index
714
Author index
715
Author index
716
Author index
717
Author index
718
Author index
719
Author index
720
Author index
721
Author index
722
Author index
723
Author index
724
Author index
725
Author index
726
Author index
727
Author index
728
Author index
729
Author index
730
Author index
731
Author index
732
Author Index
733
Author index
734
Author index
735
Author index
736
Author index
737
Author index
738
Author index
739
Author index
740
Author index
741
Author index
742
Author Index
743
Author index
744
Author index
745
Author index
746
Author index
747
Author index
748
Author index
749
Author index
750
Author index
751
Author index
752
Author index
753
Author index
754
Author index
755
Author index
756
Author index
757
Author index
758
Author index
759
Author index
760
Author index
761
Author index
762
Author index
763
Author index
764
Author index
765
Author index
766
Author index
767
Author index
768
Author index
769
Author index
770
Author index
771
Author index
772
Author index
773
Author index
774
Author index
775
Author index
776
Author index
777
Author index
778
Author index
779
Author index
780
Author index
781
Author index
782
Author index
783
Author index
784
Author index
785
Author index
786
Author index
787
Author index
788
Author Index
789
Author index
790
Author index
791
Author index
792
Author index
793
Author index
794
Author index
795
Author index
796
Author index
797
Author index
798
Author index
799
Author index
800
Author index
801
Author index
802
Author index
803
Author index
804
Author index
805
Author index
806
Author index
807
Author index
808
Author index
809
Author index
810
Author index
811
Author index
812
Author index
813
Author index
814
Author index
815
Author index
816
Author index
817
Author index
818
Author index
819
Author index
820
Author index
821
Author index
822
Author index
823
Author index
824
Author index
825
Author index
826
Author index
827
Author index
828
Author index
829
Author index
830
Author index
831
Author index
832
Author index
833
Author index
834
Author index
835
Author index
836
Author index
837
Author index
838
Author index
839
Author index
840
Author index
841
Author index
842
Author index
843
Author index
844
Author index
845
Author index
846
Author index
847
Author index
848
Author index
849
Author index
850
Author index
851
Author index
852
Author index
853
Author index
854
Author index
855
Author index
856
Author index
857
Author index
858
Author index
859
Author index
860
Author index
861
Author index
862
Author index
863
Author index
864
Author Index
865
Author index
866
Author index
867
Author index
868
Author index
869
Author index
870
Author index
871
Author index
872
Author index
873
Author index
874
Author index
875
Author index
876
Author index
877
Author index
878
Author index
879
Author index
880
Author Index
881
Author index
882
Author index
883
Author index
884
Author index
885
Author index
886
Author index
887
Author index
888
Author index
889
Author index
890
Author index
891
Author index
892
Author index
893
Author index
894
Author index
895
Author index
896
Author index
897
Author index
898
Author index
899
Author index
900
Author index
901
Author index
902
Author index
903
Author index
904
Author index
905
Author index
906
Author index
907
Author index
908
Author index
909
Author index
910
Author index
911
Author index
912
Author index
913
Author index
914
Author index
915
Author index
916
Author index
917
Author index
918
Author index
919
Author index
920
Author index
921
Author index
922
Author index
923
Author index
924
Author index
925
Author index
926
Author index
927
Author index
928
Author index
929
Author index
930
Author index
931
Author index
932
Author index
933
Author index
934
Author index
935
Author index
936
Author index
937
Author index
938
Author index
939
Author index
940
Author index
941
Author index
942
Author index
943
Author index
944
Author index
945
Author index
946
Author index
947
Author index
948
Author index
949
Author index
950
Author index
951
Author index
952
Author index
953
Author index
954
Author index
955
Author index
956
Author index
957
Author index
958
Author index
959
Author index
960
Author index
961
Author index
962
Author index
963
Author index
964
Author index
965
Author index
966
Author index
967
Author index
968
Author index
969
Author index
970
Author index
971
Author index
972
Author index
973
Author index
974
Author index
975
Author index
976
Author index
977
Author index
978
Author index
979
Author index
980
Author index
981
Author index
982
Author index
983
Author index
984
Author index
985
Author index
986
Author index
987
Author index
988
Author index
989
Author index
990
Author index
991
Author index
992
Author index
993
Author index
994
Author index
995
Author index
996
Author index
997
Author index
998
Author index
999
Author index
1000
Author Index