Search

Showing total 3,087 results

Search Constraints

Start Over You searched for: Topic information systems applications (incl.internet) Remove constraint Topic: information systems applications (incl.internet) Topic management of computing and information systems Remove constraint Topic: management of computing and information systems Publisher springer nature Remove constraint Publisher: springer nature
3,087 results

Search Results

1. Efficient Wet Paper Codes.

2. Barrier to Transition from Paper-Based to Computer-Based Patient Record: Analysis of Paper-Based Patient Records.

3. Data Integration Hub for a Hybrid Paper Search.

4. Practical Security Analysis of Dirty Paper Trellis Watermarking.

5. Measuring Performance in the Retail Industry (Position Paper).

6. A Fair Anonymous Submission and Review System.

7. Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach.

8. Interactive Virtual Oriental Brush with Pen-Tablet System.

9. Practical Environment for Realizing Augmented Classroom with Wireless Digital Pens.

10. Using Packet Combination in Multi-query Optimization for Data Collection in Sensor Networks.

11. Intelligent Agents and Their Applications.

12. Informed Recognition in Software Watermarking.

13. A Neural-Based Approach to Facial Expression Mapping Between Human and Robot.

14. An Association Method Using Concept-Base.

15. Real-Time Vision Based Gesture Recognition for Human-Robot Interaction.

16. Research on WebGIS Based on Multi-agent.

17. About the Time Complexity of Evolutionary Algorithms Based on Finite Search Space.

18. Managing Process Variants as an Information Resource.

19. A Bayesian Approach to Emotion Detection in Dialogist's Voice for Human Robot Interaction.

20. Context-Based Approach for Human Gesture Analysis.

21. Acceptance of Voting Technology: Between Confidence and Trust.

22. Exploiting Security Holes in Lattice Data Hiding.

23. Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.

24. A Study of Developing Virtual Prototyping by Using JavaBean Interface Tool and SystemC Engine.

25. Experimental Analysis on Time-Triggered Power Consumption Measurement with DVS-Enabled Multiple Power Domain Platform.

26. Ontology Based Context Alignment for Heterogeneous Context Aware Services.

27. Highspeed and Flexible Source-End DDoS Protection System Using IXP2400 Network Processor.

28. Description of a Naming Architecture Managing Cryptographic Identifiers.

29. Securing the Wireless LANs Against Internal Attacks.

30. Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database.

31. An Energy Efficient Communication Protocol Based on Data Equilibrium in Mobile Wireless Sensor Network.

32. Modeling the Effect of Forwarding in a Multi-hop Ad Hoc Networks with Weighted Fair Queueing.

33. Research on Hidden Markov Model for System Call Anomaly Detection.

34. The Situation Dependent Application Areas of EPC Sensor Network in u-Healthcare.

35. How to Overcome Main Obstacles to Building a Virtual Telematics Center.

36. Human Three-Dimensional Modeling Based on Intelligent Sensor Fusion for a Tele-operated Mobile Robot.

37. Fast Statistical Learning Algorithm for Feature Generation.

38. Implementation of Vision Based Walking Assistant System for Biped Robot.

39. Corpus Building for Corporate Knowledge Discovery and Management: A Case Study of Manufacturing.

40. Design of a Supervisor for Traffic Light Systems.

41. APD-A Tool for Identifying Behavioural Patterns Automatically from Clickstream Data.

42. An Efficient and Secure RFID Security Method with Ownership Transfer.

43. Population-Based Extremal Optimization with Adaptive Lévy Mutation for Constrained Optimization.

44. An Analysis About the Asymptotic Convergence of Evolutionary Algorithms.

45. BPMN: How Much Does It Cost? An Incremental Approach.

46. The Semantics of Business Service Orchestration.

47. Process Mining and Petri Net Synthesis.

48. Agent-Controlled Distributed Resource Sharing to Improve P2P File Exchanges in User Networks.

49. An Algorithm for Inconsistency Resolving in Recommendation Web-Based Systems.

50. Trust in LORA: Towards a Formal Definition of Trust in BDI Agents.