Web
Education
[1201.0397] Hiding Malicious Content in PDF Documents
Abstract: This paper is a proof-of-concept demonstration for a specific digital signatures vulnerability that shows the ineffectiveness of the WYSIWYS (What You See Is What You Sign) concept. The algorithm is fairly simple: the attacker generates a polymorphic file that has two different types of content (text, as a PDF document for example, and image: TIFF - two of the most widely used file ...
Smart Cards Applications in the Healthcare System
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 2, 2011 ISSN 2067 – 4074 63 reader. The computer runs a software application with which the doctor saves patient information in to the smartcard. Reading or writing the smartcard is made securely, because each time for accessing
Marius Popa - Google Scholar Citations
Journal of Mobile, Embedded and Distributed Systems 4 (4), 233 - 248, 2012. 14: 2012: Quality Metrics of Citizen Oriented Informatics Applications. M Popa, I Ivan, D Palaghită, B Vintilă ...
AASCIT - Journal -Reviewers
L. Militaru, G. Suciu, G. Todoran “The Use of Automated Software Tools in Evaluating an e-Learning Platform Quality”. “Journal of Mobile, Embedded and Distributed Systems - JMEDS”, Vol. 4, No. 3, 2012 (online), pp. 150-158 4.
An Approach to Mobile Multimedia Digital Rights Management ...
Toma, C., Boja, C.: Survey of Mobile Digital Rights Management Platforms. Journal of Mobile, Embedded and Distributed Systems 1(1), 32–42 (2009) Google Scholar
Android based Cost-Efficient AI Attendance System – IJERT
Facial Recognition using OpenCV, Journal of Mobile, Embedded and Distributed Systems(JMEDS),2014. Cristianini, N. and Shawe-Taylor, An Introduction to Support Vector Machines, Cambridge University Press,2000.
Projects – ISM – IT&C Security Master – Informatics ...
Journal of Mobile, Embedded and Distributed Systems. Scientific / Tech. Handbook. Information Security Handbook. Scientific. Maskitto Light WordPress Theme by Shufflehound. Content copyrights 2015 IT&C Security Master ism@ase.ro (+40) 021 319 19 00 / int 331. Home; About . Aims and Objectives ...
About the Conference | The 19th International Conference ...
The International Conference on INFORMATICS in ECONOMY (IE), Education, Research & Business Technologies, is held every year since 1993 in Bucharest, Romania.The Conference promotes research results in Business Informatics and related Computer Science topics: Cloud, Distributed and Parallel Computing, Mobile-Embedded and Multimedia Solutions, E-Society, Enterprise and Business Solutions ...
Real-Time Face Detection and Recognition in Complex Background
Georgescu, D. (2011) A Real-Time Face Recognition System Using Eigenfaces. Journal of Mobile, Embedded and Distributed Systems, 3, 193-204. Li, Z., Lin, D. and Tang, X. (2009) Nonparametric Discriminant Analysis for Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31, 755-761.
Concurrency Control Techniques | Distributed Computing ...
Journal of Mobile, Embedded and Distributed Systems (JMEDS) Dining Philosopher Problem. Uploaded by. Shikhar Gupta. multicore. Uploaded by. Muhammad Omar Farooq. OCPJP Threads. Uploaded by. Priya Arun. Distributed DBMS. Uploaded by. UsmanAhmed. The a to Z of DB2. Uploaded by. Nett2k. Blockchain Fundamentals.
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.