ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2009 Second International Symposium on Electronic Commerce and Security
Latest Publications
TOTAL DOCUMENTS
270
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By IEEE
9780769536439
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Image Steganography Using Pixel-Value Differencing
2009 Second International Symposium on Electronic Commerce and Security
◽
10.1109/isecs.2009.139
◽
2009
◽
Cited By ~ 9
Author(s):
Hanling Zhang
◽
Guangzhi Geng
◽
Caiqiong Xiong
Keyword(s):
Image Steganography
◽
Pixel Value
◽
Pixel Value Differencing
Download Full-text
An Empirical Analysis of Human Capital Effect on the Economic Growth of Eastern, Middle and Western China
2009 Second International Symposium on Electronic Commerce and Security
◽
10.1109/isecs.2009.249
◽
2009
◽
Author(s):
Yueliang Wu
Keyword(s):
Economic Growth
◽
Human Capital
◽
Empirical Analysis
◽
Western China
Download Full-text
Integration of Gait and Side Face for Human Recognition in Video
2009 Second International Symposium on Electronic Commerce and Security
◽
10.1109/isecs.2009.202
◽
2009
◽
Cited By ~ 1
Author(s):
Qi-Shen Li
◽
Zhi-Tian Lu
◽
Dan-Dan Zhang
Keyword(s):
Human Recognition
◽
Side Face
Download Full-text
A Camera Self-calibration Method Based on Hybrid Optimization Algorithm
2009 Second International Symposium on Electronic Commerce and Security
◽
10.1109/isecs.2009.192
◽
2009
◽
Cited By ~ 1
Author(s):
Li QiShen
◽
Lin LiCai
◽
Jiang ZeTao
Keyword(s):
Optimization Algorithm
◽
Calibration Method
◽
Hybrid Optimization
◽
Self Calibration
◽
Hybrid Optimization Algorithm
Download Full-text
A Majority Voting Scheme in Wireless Sensor Networks for Detecting Suspicious Node
2009 Second International Symposium on Electronic Commerce and Security
◽
10.1109/isecs.2009.142
◽
2009
◽
Cited By ~ 1
Author(s):
Chou Fan
◽
Jin Tan
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Majority Voting
◽
Wireless Sensor
◽
Voting Scheme
Download Full-text
Fuzzy Comprehensive Evaluation on Digital Libraries Based on Membership Degree Transformation New Algorithm-M(1,2,3)
2009 Second International Symposium on Electronic Commerce and Security
◽
10.1109/isecs.2009.245
◽
2009
◽
Author(s):
Hua Jiang
Keyword(s):
Digital Libraries
◽
Comprehensive Evaluation
◽
Fuzzy Comprehensive Evaluation
◽
Membership Degree
Download Full-text
Application of Unascertained Neural Networks to Financial Early Warning
2009 Second International Symposium on Electronic Commerce and Security
◽
10.1109/isecs.2009.133
◽
2009
◽
Author(s):
Huawang Shi
Keyword(s):
Neural Networks
◽
Early Warning
Download Full-text
Evaluating the Efficiency of Self Adaptive GA and Deterministic Dynamic Adaptation GA in Online Auctions Environment
2009 Second International Symposium on Electronic Commerce and Security
◽
10.1109/isecs.2009.241
◽
2009
◽
Author(s):
Gan Kim Soon
◽
Patricia Anthony
◽
Jason Teo
◽
Chin Kim On
Keyword(s):
Online Auctions
◽
Dynamic Adaptation
◽
Deterministic Dynamic
◽
Self Adaptive
Download Full-text
An Adaptive Algorithm Based on Image Segmentation
2009 Second International Symposium on Electronic Commerce and Security
◽
10.1109/isecs.2009.50
◽
2009
◽
Author(s):
Lang Liu
◽
Yong Liu
◽
Ying Lin
Keyword(s):
Image Segmentation
◽
Adaptive Algorithm
Download Full-text
Content Based Image Hashing Robust to Geometric Transformations
2009 Second International Symposium on Electronic Commerce and Security
◽
10.1109/isecs.2009.118
◽
2009
◽
Cited By ~ 4
Author(s):
Han-ling Zhang
◽
Cai-qiong Xiong
◽
Guang-zhi Geng
Keyword(s):
Image Hashing
◽
Geometric Transformations
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close