ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2015 International Conference on Emerging Information Technology and Engineering Solutions
Latest Publications
TOTAL DOCUMENTS
19
(FIVE YEARS 0)
H-INDEX
3
(FIVE YEARS 0)
Published By IEEE
9781479918386
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Table of Contents
2015 International Conference on Emerging Information Technology and Engineering Solutions
◽
10.1109/eites.2015.8
◽
2015
◽
Download Full-text
Conference Committee
2015 International Conference on Emerging Information Technology and Engineering Solutions
◽
10.1109/eites.2015.6
◽
2015
◽
Keyword(s):
Conference Committee
Download Full-text
Bounded-SVD: A Matrix Factorization Method with Bound Constraints for Recommender Systems
2015 International Conference on Emerging Information Technology and Engineering Solutions
◽
10.1109/eites.2015.10
◽
2015
◽
Cited By ~ 2
Author(s):
Bang Hai Le
◽
Kien Quang Nguyen
◽
Ruck Thawonmas
Keyword(s):
Recommender Systems
◽
Matrix Factorization
◽
Factorization Method
◽
Bound Constraints
Download Full-text
Technical Program Committee
2015 International Conference on Emerging Information Technology and Engineering Solutions
◽
10.1109/eites.2015.7
◽
2015
◽
Keyword(s):
Program Committee
◽
Technical Program Committee
◽
Technical Program
Download Full-text
[Copyright notice]
2015 International Conference on Emerging Information Technology and Engineering Solutions
◽
10.1109/eites.2015.3
◽
2015
◽
Keyword(s):
Copyright Notice
Download Full-text
Publisher's Information
2015 International Conference on Emerging Information Technology and Engineering Solutions
◽
10.1109/eites.2015.18
◽
2015
◽
Download Full-text
Message from the General Chairs
2015 International Conference on Emerging Information Technology and Engineering Solutions
◽
10.1109/eites.2015.4
◽
2015
◽
Download Full-text
Scalable Honeypot Architecture for Identifying Malicious Network Activities
2015 International Conference on Emerging Information Technology and Engineering Solutions
◽
10.1109/eites.2015.15
◽
2015
◽
Cited By ~ 7
Author(s):
Gokul Kannan Sadasivam
◽
Chittaranjan Hota
Download Full-text
Enhanced K Strange Points Clustering Algorithm
2015 International Conference on Emerging Information Technology and Engineering Solutions
◽
10.1109/eites.2015.14
◽
2015
◽
Cited By ~ 6
Author(s):
Terence Johnson
◽
Santosh Kumar Singh
Keyword(s):
Clustering Algorithm
Download Full-text
Experiments in Encrypted and Searchable Network Audit Logs
2015 International Conference on Emerging Information Technology and Engineering Solutions
◽
10.1109/eites.2015.13
◽
2015
◽
Author(s):
Bhanu Prakash Gopularam
◽
Sashank Dara
◽
Nalini Niranjan
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close