-
1
-
-
84887326068
-
Traffic monitoring guide
-
USDOT, "Traffic Monitoring Guide", Section 3, Traffic Volume Monitoring, http://www.fhwa.dot.gov/ohim/tmguide/tmg3.htm, 2001.
-
(2001)
Section 3, Traffic Volume Monitoring
-
-
-
2
-
-
0032155819
-
Annual average daily traffic prediction model for county roads
-
D. Mohamad, K. C. Sinha, T. Kuczek, and C. F. Scholer, "Annual Average Daily Traffic Prediction Model for County Roads", Journal of the Transportation Research Board, vol. 1617/1998, pp. 69-77, 1998. (Pubitemid 128553696)
-
(1998)
Transportation Research Record
, Issue.1617
, pp. 69-77
-
-
Mohamad, D.1
Sinha, K.C.2
Kuczek, T.3
Scholer, C.F.4
-
3
-
-
0034205574
-
Estimation of aadt from short period counts in hong kong - A comparison between neural network method and regression analysis
-
W. Lam and J. Xu, "Estimation of AADT from Short Period Counts in Hong Kong - A Comparison Between Neural Network Method and Regression Analysis", Journal of Advanced Transportation, 2000.
-
Journal of Advanced Transportation, 2000
-
-
Lam, W.1
Xu, J.2
-
4
-
-
33846504965
-
Improving the prediction of annual average daily traffic for nonfreeway facilities by applying a spatial statistical method
-
Artificial Intelligence and Advanced Computing Applications
-
J. K. Eom, M. S. Park, T. Heo, and L. F. Huntsinger, "Improving the Prediction of Annual Average Daily Traffic for Nonfreeway Facilities by Applying a Spatial Statistical Method", Journal of the Transportation Research Board, vol. 1968/2006, pp. 20-29, 2006. (Pubitemid 46167287)
-
(2006)
Transportation Research Record
, Issue.1968
, pp. 20-29
-
-
Eom, J.K.1
Park, M.S.2
Heo, T.-Y.3
Huntsinger, L.F.4
-
5
-
-
56349122420
-
AADT prediction using support vector regression with data-dependent parameters
-
March
-
M. C. Neto, Y. Jeong, M. K. Jeong, and L. D. Han, "AADT prediction using support vector regression with data-dependent parameters", Expert Systems with Applications, vol. 36, pp. 2979-2986, March 2009.
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 2979-2986
-
-
Neto, M.C.1
Jeong, Y.2
Jeong, M.K.3
Han, L.D.4
-
6
-
-
77953357627
-
A decomposition scheme for estimating dynamic origindestination flows on actuation-controlled signalized arterials
-
Y. Lou and Y. Yin, "A Decomposition Scheme for Estimating Dynamic Origindestination Flows on Actuation-controlled Signalized Arterials", Transportation Research Part C, vol. 18, 2010.
-
(2010)
Transportation Research Part C
, vol.18
-
-
Lou, Y.1
Yin, Y.2
-
8
-
-
76849107541
-
FleaNet: A virtual market place on vehicular networks
-
U. Lee, J. Lee, J. Park, and M. Gerla, "FleaNet: A Virtual Market Place on Vehicular Networks", IEEE Trans. on Vehicular Technology, 2010.
-
IEEE Trans. on Vehicular Technology, 2010
-
-
Lee, U.1
Lee, J.2
Park, J.3
Gerla, M.4
-
9
-
-
84887364756
-
-
Online
-
[Online]. Available: http://www.its.dot.gov/press/2010/vii2intellidrive
-
-
-
-
10
-
-
84887337614
-
-
Online
-
[Online]. Available: http://www.dot.gov
-
-
-
-
12
-
-
0002809150
-
One-way accumulators: A decentralized alternative to digital signatures
-
J. Benaloh and M. D. Mare, "One-way Accumulators: a Decentralized Alternative to Digital Signatures", Proc. of EUROCRYPT, 1993.
-
Proc. of EUROCRYPT, 1993
-
-
Benaloh, J.1
Mare, M.D.2
-
13
-
-
0004216472
-
-
2nd ed. Prentice Hall
-
C. Kaufman, R. Perlman, and M. Speciner, Network Security, Private Communication in a Public World, 2nd ed. Prentice Hall, 2002.
-
(2002)
Network Security, Private Communication in a Public World
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
14
-
-
0017930809
-
METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS.
-
DOI 10.1145/359340.359342
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, vol. 21, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
15
-
-
38049015677
-
On the generation of cryptographically strong pseudorandom sequences
-
A. Shamir, "On the generation of cryptographically strong pseudorandom sequences", ACM Trans. on Computer System, 1983.
-
(1983)
ACM Trans. on Computer System
-
-
Shamir, A.1
-
17
-
-
84887323038
-
Floating car data from smartphones: What google and waze know about you and how hackers can control traffic
-
T. Jeske, "Floating Car Data from Smartphones: What Google and Waze Know About You and How Hackers Can Control Traffic", Proc. of the BlackHat Europe, 2013.
-
(2013)
Proc. of the BlackHat Europe
-
-
Jeske, T.1
-
19
-
-
24944474471
-
Limiting privacy breaches in privacy preserving data mining
-
A. Evfimievski, J. Gehrke, and R. Srikant, "Limiting Privacy Breaches in Privacy Preserving Data Mining", Proc. of PODS, 2003.
-
(2003)
Proc. of PODS
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
20
-
-
33751023839
-
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
-
Applied Computing 2006 - The 21st Annual ACM Symposium on Applied Computing - Proceedings of the 2006 ACM Symposium on Applied Computing
-
H. Yu, X. Jiang, and J. Vaidya, "Privacy Preserving SVM using Nonlinear Kernels on Horizontally Partitioned Data", Proc. of the 2006 ACM symposium on Applied Computing, pp. 603-610, 2006. (Pubitemid 44758853)
-
(2006)
Proceedings of the ACM Symposium on Applied Computing
, vol.1
, pp. 603-610
-
-
Yu, H.1
Jiang, X.2
Vaidya, J.3
-
21
-
-
85012940052
-
Protecting sensitive association rules in privacy preserving data mining using genetic algorithms
-
S. Narmadha and S. Vijayarani, "Protecting Sensitive Association Rules in Privacy Preserving Data Mining using Genetic Algorithms", Journal of Computer Applications, vol. 33, no. 7, pp. 36-43, 2011.
-
(2011)
Journal of Computer Applications
, vol.33
, Issue.7
, pp. 36-43
-
-
Narmadha, S.1
Vijayarani, S.2
|