
Journal Article
Analyzing Authentication in Kerberos-5 Using Distributed Temporal Protocol Logic
Journal of Information and Computing Science, Vol. 2 (2007), Iss. 3 : pp. 163–171
Journal Article
A Fourth Order Dual Method for Iteration Regularization with H-1 Fidelity Based Denoising
Journal of Information and Computing Science, Vol. 2 (2007), Iss. 3 : pp. 172–178
Journal Article
Estimating Error Bounds for Non-stationary Binary Subdivision Curves / Surfaces
Journal of Information and Computing Science, Vol. 2 (2007), Iss. 3 : pp. 179–190
Journal Article
Generating Multivariate Nonnormal Distribution Random Numbers Based on Copula Function
Journal of Information and Computing Science, Vol. 2 (2007), Iss. 3 : pp. 191–196
Journal Article
High Dimensional and Large Numbers of Data Clustering Method Based Sensitive Subspace
Journal of Information and Computing Science, Vol. 2 (2007), Iss. 3 : pp. 197–202
Journal Article
Computational Algorithm to Obtain Multiple Positive Solutions for Sublinear Semipositone Problems
Journal of Information and Computing Science, Vol. 2 (2007), Iss. 3 : pp. 203–208
Journal Article
Eye Location and Eye State Detection in Facial Images with Unconstrained Background
Journal of Information and Computing Science, Vol. 2 (2007), Iss. 3 : pp. 209–214
Journal Article
Exploiting word positional information in ngram model for Chinese text input method
Journal of Information and Computing Science, Vol. 2 (2007), Iss. 3 : pp. 215–222
Journal Article
A New Reduction Implementation Based on Concept
Journal of Information and Computing Science, Vol. 2 (2007), Iss. 3 : pp. 223–227
Journal Article
Towards Designing and Implementing an Expert Network To Manage the Computer Communication Networks
Journal of Information and Computing Science, Vol. 2 (2007), Iss. 3 : pp. 228–234
Journal Article
Research on RBAC-based Separation of Duty Constraints
Journal of Information and Computing Science, Vol. 2 (2007), Iss. 3 : pp. 235–240