Search from the table of contents of 2.5 million books
Advanced Search (Beta)
Home > Proceedings of International Conference on Computer Science and Information Technology: CSAIT 2013, September 21–23, 2013, Kunming, China

Proceedings of International Conference on Computer Science and Information Technology: CSAIT 2013, September 21–23, 2013, Kunming, China


Book Informaton

Proceedings of International Conference on Computer Science and Information Technology: CSAIT 2013, September 21–23, 2013, Kunming, China

Author

Fang Tang, Ke Zhang, Dian Shimei (auth.), Srikanta Patnaik, Xiaolong Li (eds.)

Series

Advances in Intelligent Systems and Computing 255

Year of Publication

2014

Publisher

Springer India

Language

en

ISBN

9788132217589, 9788132217596

ARI Id

1672618332304


Find on

World Cat

OpenLibrary

Internet Archive


This page has been accessed 4 times.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Citation Options
Download Citation

Showing 1 to 20 of 102 entries
Chapters/HeadingsAuthor(s)PagesInfo
The PSF Measurement for Motion-Blurred Image Based on Analyzing the Frequency Spectr
EBR Analysis of Digital Image Watermarki
Image Descriptors Based on Statistical Thermodynamics and Applicatio
A Novel Image Retrieval Method Based on Fractal Code and Fuzzy S
Velocity Evaluation in Traffic Accidents Occurred at the Road Intersection Based on Image Processi
A Hybrid Method for Extracting Liver from 3D CT Ima
A New Image-Fusion Technique Based on Blocked Sparse Representati
The Studying of the Restoration of Defocused Imag
High-Order Total Variation-Based Image Restoration with Spatially Adapted Parameter Selecti
Research of Vehicle Identification Based on Adaptive Corner Detecti
Knowledge-Aided Bayesian Optimum Radar Detect
An Improvement of an Identity-Based Key-insulated Signcrypti
Stability Analysis of a Rapid Scanning Worm Propagation Model with Quarantine Strate
A Fuzzy Bayesian Approach to Enhance SCADA Network Securi
Trusted Network Access Authentication Scheme Based on the Lab
A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanis
Wormhole Detection Algorithm Based on RTT and Neighborhood Informati
Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Netwo
Ad hoc Eavesdropping Algorithm-Based Network Codi
Improved Halftone Visual Cryptography by Random Gri
Chapters/HeadingsAuthor(s)PagesInfo
Showing 1 to 20 of 102 entries