Search alternatives:
interactive visualization » information visualization
functionality securing » functionality setting, functionality using, functionality testing
visualization https » globalization https
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
1
Published 2012
Table of Contents: ... Network Data Collection -- Knowledge Mining from the Twitter Social Network -- Part II: Visualization...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...
View full text
Electronic eBook
3
Published 2012
Table of Contents: ... Authentication --  On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time...
View full text
Electronic eBook
4
Published 2006
Table of Contents: ... -- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM -- Wavelet Transform in Face...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ... -- Integral Invariants and Shape Matching -- On the Representation of Shapes Using Implicit Functions...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... Security and an Application to File System Accesses -- Regular Papers -- A Machine Text-Inspired Machine...
View full text
Electronic eBook
7
Published 2010
Table of Contents: ... -- MACRO-SYS: An Interactive Macroeconomics Simulator for Advanced Learning -- Managing Web Services...
View full text
Electronic eBook
8
Published 2007
Table of Contents: ... Measurement: The Case of a Corporate IT Function -- On the Performance of Workflow Processes with Distributed...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ...: An fMRI Study -- Clustering of fMRI Data Using Affinity Propagation -- Interaction between Visual...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... the Most Desirable Skyline Objects -- Privacy and Security -- Multiple Sensitive Association Protection...
View full text
Electronic eBook
11
by Sun, Ming-Ting., Sun, Ming-Ting.
Published 2012
Table of Contents: ... Contact Correction Using Radial Basis Function for Wide Baseline Videoconference System -- An Integrated...
View full text
Electronic eBook
12
Published 2012
Table of Contents: ... -- Interpolating between Random Walks and Shortest Paths: A Path Functional Approach -- Dynamic Targeting...
View full text
Electronic eBook
13
Published 2006
Table of Contents: ...Watermarking Is Not Cryptography -- Secure Quantization Index Modulation Watermark Detection...
View full text
Electronic eBook
14
Published 2006
Table of Contents: ... the Real Point Spread Function of High Numerical Aperture Microscope Objective Lenses -- Photon Detectors...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... Attack -- Infrastructure Modeling and Simulation -- Interactive Visualization of Interdependencies...
View full text
Electronic eBook
16
Published 2015
Table of Contents: ... in Schematics of Systems -- S-DILS: Framework for Secured Digital Interaction Learning System Using Keccak...
View full text
Electronic eBook
17
Published 2015
Table of Contents: ... -- Social computing -- Information security -- Virtual reality and human-computer interaction -- Healthcare...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... of the Internet Protocol Security and Its Impact on Interactive Communications -- Investigating Software...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ...-device Web Applications with Database Access -- Enriching Hypermedia Application Interfaces -- Functional...
View full text
Electronic eBook
20
Published 2006
Table of Contents: ... Visualizations of Business Processes -- Service-Oriented Data and Process Models for Personalization...
View full text
Electronic eBook