0 | -- | 0 | Pallavi Khatri, Shashikala Tapaswi, Udai P. Verma. Trust evaluation in wireless ad-hoc networks using fuzzy system |
0 | -- | 0 | H. Ari Raptino, Shunsuke Saruwatari, Masaki Bandai, Takashi Watanabe. Rate and relay diversity in temporal spectrum sharing |
0 | -- | 0 | Zhixiao Wang, Yanxiao Liu, Wenyao Yan, Wei Wei, Junhuai Li, Deyun Zhang, Omar Alfandi. Cheating detection and cheater identification in (t, n) secret sharing scheme |
0 | -- | 0 | Andres Mejia, Reyes Juárez-Ramírez, Sergio Inzunza, Rocio Valenzuela. Implementing adaptive interfaces: a use model for the development of usability in interactive systems |
0 | -- | 0 | M. Suresha, Ajit Danti, S. K. Narasimhamurthy. Decision trees to multiclass prediction for analysis of arecanut data |
0 | -- | 0 | Atsushi Kato. Software industry in Okinawa: is 'domestic offshore outsourcing' scheme feasible? |
0 | -- | 0 | Wuyungerile Li, Shunsuke Saruwatari, Masaki Bandai, Takashi Watanabe. Discussions on trade-offs in data aggregation in wireless sensor networks |
0 | -- | 0 | Supriya Chakraborty, Nabendu Chaki. Generic organization of semi-structured data |
0 | -- | 0 | James Carmichael. Diagnosis of dysarthria subtype via spectral and waveform analysis |
0 | -- | 0 | Aziz Qaroush, Mahdi Washaha, Ismail M. Khater. Efficient spam filtering based on informative features extracted from the header fields and the URLs in the message |
0 | -- | 0 | Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar, Mridul Sankar Barik. A two-phase quantitative methodology for enterprise information security risk analysis |