095 / 2 |
Vision-Based Real-Time Flame Detection Using Logistic Regression Model
|
|
2012-10-30 |
082 / 1 |
An efficient algorithm for managing a parallel heap
|
|
2016-12-21 |
095 / 2 |
An Improvement of Liaw-Lin-Wu's Efficient and Complete Remote Mutual Authentication with Smart Cards
|
|
2012-10-30 |
090 / 1 |
Classification of Age Groups Based on Facial Features
|
|
2016-12-28 |
096 / 2 |
A Real-Time Driver Fatigue Detection System Based
on Eye Tracking and Dynamic Template Matching
|
|
2015-03-03 |
097 / 1 |
A Fast Image-Based Fire Flame Detection Method Using Color Analysis
|
|
2016-11-21 |
092 / 2 |
Inventory model with a service level constraint for variable lead time demand with the mixtures of distribution
|
|
2014-01-17 |
092 / 2 |
A note on inventory model involving variable lead time with defective units for mixtures of distribution
|
|
2016-12-06 |
098 / 2 |
A Secure Remote Authentication Scheme Preserving User Anonymity with Non-Tamper Resistant Smart Cards
|
|
2015-03-03 |
079 / 1 |
A shortest path algorithm to find minimal deduction graphs
|
|
2013-12-09 |
098 / 1 |
Optimizing Region of Support for Boundary-Based Corner Detection: A Statistic Approach
|
|
2013-10-08 |
099 / 1 |
Privacy Preservation in Secure Group Communication for Vehicular Ad Hoc Networks
|
|
2014-08-12 |
098 / 1 |
Revision of Using Eigenvalues of Covariance Matrices in Boundary-Based Corner Detection
|
|
2013-10-08 |
099 / 1 |
Security Analysis and Improvement of the Remote User Authentication Scheme without Using Smart Cards
|
|
2013-10-07 |
100 / 1 |
Cryptanalysis and Improvement of Wen et al.'s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices
|
|
2017-06-14 |
100 / 2 |
Effects On Learning Logographic Character Formation In Computer-Assisted Handwriting Instruction
|
|
2013-05-22 |
101 / 1 |
Further Cryptanalysis of Huang-Wei’s Efficient Remote User Authentication Scheme with Smart Cards
|
|
2017-06-15 |
101 / 1 |
Privacy Preservation in Secure Group Communication for Vehicular Ad Hoc Networks
|
|
2015-06-03 |
101 / 1 |
How to Enhance MIFARE System Security in the Current Crypto-1 Broken Status
|
|
2013-04-11 |
101 / 1 |
A New Front-End Anonymity and Back-End Real-Name Mechanism in e-Commerce
|
|
2013-04-11 |
101 / 1 |
A Security and Efficiency Improvement of Chung et al.'s Remote Authentication Scheme for Resource-Limited Environments
|
|
2013-11-14 |
102 / 1 |
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy
|
|
2014-08-21 |
102 / 1 |
Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards
|
|
2016-08-30 |
100 / 1 |
Improvements of Driver Fatigue Detection System Based on Eye Tracking and Dynamic Template Matching
|
|
2015-06-15 |