-
1
-
-
84982262818
-
-
Technical Report. Computer Emergency Response Team (CERT), Mass, EEUU
-
Kimberland, K. (2010). 2010 CybersecurityWatch Survey. Technical Report. Computer Emergency Response Team (CERT), Mass, EEUU
-
(2010)
2010 CybersecurityWatch Survey
-
-
Kimberland, K.1
-
2
-
-
54049100264
-
-
Hindawi Publishing Co, NY, USA
-
Liu, K., Trappe, W., Wang, Z., Wu, M., and Zhao, H. (2005). Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Co, NY, USA
-
(2005)
Multimedia Fingerprinting Forensics for Traitor Tracing
-
-
Liu, K.1
Trappe, W.2
Wang, Z.3
Wu, M.4
Zhao, H.5
-
3
-
-
77949791448
-
A review of digital watermarking techniques for text documents
-
ICIMT?09, Jeju Island, South Korea, December 16-18 IEEE, New Jersey, USA
-
Jalil, Z., and Mirza, A. (2009). A Review of Digital Watermarking Techniques for Text Documents. Int. Conf. Information, and Multimedia Technology. ICIMT?09, Jeju Island, South Korea, December 16-18, pp. 230-234. IEEE, New Jersey, USA
-
(2009)
Int. Conf. Information, and Multimedia Technology
, pp. 230-234
-
-
Jalil, Z.1
Mirza, A.2
-
4
-
-
11844303521
-
Grouporiented fingerprinting for multimedia forensics
-
Wang, Z.J., Wu, M., Trappe, W., and Liu, K.J.R. (2004). Grouporiented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process., 2004, 2153-2173
-
(2004)
EURASIP J. Appl. Signal Process
, vol.2004
, pp. 2153-2173
-
-
Wang, Z.J.1
Wu, M.2
Trappe, W.3
Liu, K.J.R.4
-
5
-
-
0024931843
-
-
Fifth Annual Computer Security Applications Conf. Tucson, AZ, December 4-8 IEEE, New Jersey, USA
-
Casey, T., Roe, M., Tuck, B., and Wilbur, S. (1989). Secure Automated Document delivery. Fifth Annual Computer Security Applications Conf., 1989, Tucson, AZ, December 4-8, pp. 348-356. IEEE, New Jersey, USA
-
(1989)
Secure Automated Document Delivery
, vol.1989
, pp. 348-356
-
-
Casey, T.1
Roe, M.2
Tuck, B.3
Wilbur, S.4
-
6
-
-
84982266493
-
-
ICICS?97 -Int. Conf. Information, and Communications, Beijing, China, November 11-14 Springer, Berlin
-
Lioy, A., Maino, F., and Mezzalama, M. (1997). Secure Document Management, and Distribution in an Open Network Environment. ICICS?97 -Int. Conf. Information, and Communications, Beijing, China, November 11-14, pp. 109-117. Springer, Berlin
-
(1997)
Secure Document Management, and Distribution in An Open Network Environment
, pp. 109-117
-
-
Lioy, A.1
Maino, F.2
Mezzalama, M.3
-
7
-
-
33745728510
-
-
2005 IEEE Int. Conf. Information Reuse, and Integration, Las Vegas, NV, USA, August 15-17 IEEE, New Jersey, USA
-
Shi, J., and Ouyang, J. (2005). eSign: An Enterprise Portal for Secure Document Management. 2005 IEEE Int. Conf. Information Reuse, and Integration, Las Vegas, NV, USA, August 15-17, pp. 481-486. IEEE, New Jersey, USA
-
(2005)
ESign: An Enterprise Portal for Secure Document Management
, pp. 481-486
-
-
Shi, J.1
Ouyang, J.2
-
8
-
-
33749068906
-
-
The 6th Annual 2005 Int. Siberian Workshop, and Tutorials on Electron Devices, and Materials, Erlagol, Altai, Russia, July 1-3 IEEE, New Jersey, USA
-
Gerasimov, D. (2005). Creation of the System of Secure Document Circulation for State Organization. The 6th Annual 2005 Int. Siberian Workshop, and Tutorials on Electron Devices, and Materials, Erlagol, Altai, Russia, July 1-3, pp. 248-249. IEEE, New Jersey, USA
-
(2005)
Creation of the System of Secure Document Circulation for State Organization
, pp. 248-249
-
-
Gerasimov, D.1
-
9
-
-
71049147865
-
-
IEEE 10th Int. Enterprise Distributed Object Computing Conference Workshops 2006. EDOCW?06, Hong Kong, China, October 16-20 IEEE, New Jersey, USA
-
Kwok, T., and Nguyen, T. (2006). An Enterprise Electronic Contract Management System using Dual XML, and Secure PDF Documents. IEEE 10th Int. Enterprise Distributed Object Computing Conference Workshops, 2006. EDOCW?06, Hong Kong, China, October 16-20, pp. 57-60. IEEE, New Jersey, USA
-
(2006)
An Enterprise Electronic Contract Management System Using Dual XML, and Secure PDF Documents
, pp. 57-60
-
-
Kwok, T.1
Nguyen, T.2
-
10
-
-
47349083796
-
-
IEEE Int. Conf. e-Business Engineering 2007, Hong Kong, China, October 24-26 IEEE, New Jersey, USA
-
Chieu, T., Nguyen, T., and Zeng, L. (2007). Secure Search of Private Documents in an Enterprise Content Management System. IEEE Int. Conf. e-Business Engineering, 2007, Hong Kong, China, October 24-26, pp. 105-112. IEEE, New Jersey, USA
-
(2007)
Secure Search of Private Documents in An Enterprise Content Management System
, pp. 105-112
-
-
Chieu, T.1
Nguyen, T.2
Zeng, L.3
-
11
-
-
71249087251
-
-
10th ACIS Int. Conf. Software Engineering, Artificial Intelligences, Networking, and Parallel/Distributed Computing 2009. SNPD, Daegu, South Korea, May 27-29 IEEE, New Jersey, USA
-
Odagiri, K., Ishii, N., Yaegashi, R., and Tadauchi, M. (2009). A Distribution System of Document Medium with Copyright Protection. 10th ACIS Int. Conf. Software Engineering, Artificial Intelligences, Networking, and Parallel/Distributed Computing, 2009. SNPD, Daegu, South Korea, May 27-29, pp. 207-212. IEEE, New Jersey, USA
-
(2009)
A Distribution System of Document Medium with Copyright Protection
, pp. 207-212
-
-
Odagiri, K.1
Ishii, N.2
Yaegashi, R.3
Tadauchi, M.4
-
12
-
-
48349107806
-
Access control for xml document
-
Nguyen, N., Borzemski L., Grzech, A., and Ali, M. (eds Springer, Berlin, Germany
-
Bai, Y. (2008). Access Control for XML Document. In Nguyen, N., Borzemski, L., Grzech, A., and Ali, M. (eds), New Frontiers in Applied Artificial Intelligence, Lecture Notes in Computer Science 5027, pp. 621-630. Springer, Berlin, Germany
-
(2008)
New Frontiers in Applied Artificial Intelligence, Lecture Notes in Computer Science
, vol.5027
, pp. 621-630
-
-
Bai, Y.1
-
13
-
-
33746653154
-
-
Technical Report. University of Oldenburg, Oldenburg, Germany
-
Sevinc, P., Basin, D., and Olderog, E.-R. (2006). Controlling Access to Documents: A Formal Access Control Model. Technical Report. University of Oldenburg, Oldenburg, Germany
-
(2006)
Controlling Access to Documents: A Formal Access Control Model
-
-
Sevinc, P.1
Basin, D.2
Olderog, E.-R.3
-
14
-
-
84868131868
-
Self-protecting documents for cloud storage security
-
TrustCom Liverpool, UK, June 25-27 IEEE, New Jersey, USA
-
Munier, M., Vincent, L., and Magali, R. (2012). Self-protecting Documents for Cloud Storage Security. IEEE 11th Int. Conf. Trust, Security, and Privacy in Computing, and Communications (TrustCom), Liverpool, UK, June 25-27, pp. 1231-1238. IEEE, New Jersey, USA
-
(2012)
IEEE 11th Int. Conf. Trust, Security, and Privacy in Computing, and Communications
, pp. 1231-1238
-
-
Munier, M.1
Vincent, L.2
Magali, R.3
-
15
-
-
84900199367
-
-
Adobe White Paper. Adobe Systems Incorporated, California, USA
-
Adobe (2007) A Primer on Electronic Document Security. White Paper. Adobe Systems Incorporated, California, USA
-
(2007)
A Primer on Electronic Document Security
-
-
-
16
-
-
84865354418
-
New system to fingerprint extensible markup language documents using winnowing theory
-
Darwish, S. (2012). New system to fingerprint extensible markup language documents using winnowing theory. Signal Process. IET, 6, 348-357
-
(2012)
Signal Process. IET
, vol.6
, pp. 348-357
-
-
Darwish, S.1
-
17
-
-
1142267351
-
-
The 2003 ACM SIGMOD Int. Conf. Management of Data, SIGMOD?03, San Diego, CA, June 9-12 ACM, New York, NY, USA
-
Schleimer, S., Wilkerson, D.S., and Aiken, A. (2003). Winnowing: Local Algorithms for Document Fingerprinting. The 2003 ACM SIGMOD Int. Conf. Management of Data, SIGMOD?03, San Diego, CA, June 9-12, pp. 76-85. ACM, New York, NY, USA
-
(2003)
Winnowing: Local Algorithms for Document Fingerprinting
, pp. 76-85
-
-
Schleimer, S.1
Wilkerson, D.S.2
Aiken, A.3
-
18
-
-
0034593185
-
-
The 2000 Workshop on New Security Paradigms, NSPW?00, New York, NY, USA, September 29-31 ACM, New York, NY, USA
-
Atallah, M., McDonough, C., Raskin, V., and Nirenburg, S. (2000). Natural Language Processing for Information Assurance, and Security: An Overview, and Implementations. The 2000 Workshop on New Security Paradigms, NSPW?00, New York, NY, USA, September 29-31, pp. 51-65. ACM, New York, NY, USA
-
(2000)
Natural Language Processing for Information Assurance, and Security: An Overview, and Implementations
, pp. 51-65
-
-
Atallah, M.1
McDonough, C.2
Raskin, V.3
Nirenburg, S.4
-
19
-
-
58349109703
-
-
The 9th Int. Conf. Young Computer Scientists CYCS, Shanghai, East China, November 18-21 IEEE, New Jersey, USA
-
Lu, P., Lu, Z., Zhou, Z., and Gu, J. (2008). An Optimized Natural Language Watermarking Algorithm based on TMR. The 9th Int. Conf. Young Computer Scientists CYCS, Shanghai, East China, November 18-21, pp. 1459-1463. IEEE, New Jersey, USA
-
(2008)
An Optimized Natural Language Watermarking Algorithm Based on TMR
, pp. 1459-1463
-
-
Lu, P.1
Lu, Z.2
Zhou, Z.3
Gu, J.4
-
20
-
-
47349085616
-
Natural language watermarking via morphosyntactic alterations
-
Meral, H.M., Sankur, B., Özsoy, A.S., Güngör, T., and Sevinç, E. (2009). Natural language watermarking via morphosyntactic alterations. Comput. Speech Lang., 23, 107-125
-
(2009)
Comput. Speech Lang
, vol.23
, pp. 107-125
-
-
Meral, H.M.1
Sankur, B.2
Özsoy, A.S.3
Güngör, T.4
Sevinç, E.5
-
21
-
-
84982290177
-
A method of text watermarking using presuppositions
-
Eduard, J., and Delp III, P.W. W. (eds IX, San Jose, CA, USA, January 29-February 1 SPIE, Bellingham, Washington, USA
-
Voybornova, O., and Macq, B. (2007). A Method of Text Watermarking Using Presuppositions. In Eduard, J., and Delp III, P.W. W. (eds), Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, USA, January 29-February 1, pp. 1-10. SPIE, Bellingham, Washington, USA
-
(2007)
Security, Steganography, and Watermarking of Multimedia Contents
, pp. 1-10
-
-
Voybornova, O.1
Macq, B.2
-
22
-
-
26844470147
-
-
The 1st Int. Conf. Advances in Natural Computation -Volume Part III, ICNC?05, Changsha, China, August 27-29 Springer, Berlin
-
Sun, X., and Asiimwe, A.J. (2005). Noun-verb Based Technique of Text Watermarking using Recursive Descent Semantic Net Parsers. The 1st Int. Conf. Advances in Natural Computation -Volume Part III, ICNC?05, Changsha, China, August 27-29, pp. 968-971. Springer, Berlin
-
(2005)
Noun-verb Based Technique of Text Watermarking Using Recursive Descent Semantic Net Parsers
, pp. 968-971
-
-
Sun, X.1
Asiimwe, A.J.2
-
23
-
-
79551639722
-
-
2008 Int. Conf. Computer Science, and Software Engineering, Wuhan, China, December 12-14 IEEE, New Jersey, USA
-
He, J., and Zhang, H. (2008). Digital Right Management Model based on Cryptography, and Digital Watermarking. 2008 Int. Conf. Computer Science, and Software Engineering, Wuhan, China, December 12-14, pp. 656-660. IEEE, New Jersey, USA
-
(2008)
Digital Right Management Model Based on Cryptography, and Digital Watermarking
, pp. 656-660
-
-
He, J.1
Zhang, H.2
-
24
-
-
79961225125
-
-
2011 Int. Conf. Multimedia Computing, and Systems (ICMCS Ouarzazate, Morocco, April 7-9 IEEE, New Jersey, USA
-
Zaz, Y., and Fadil, L. (2011). Enhanced EPR Data Protection using Cryptography, and Digital Watermarking. 2011 Int. Conf. Multimedia Computing, and Systems (ICMCS), Ouarzazate, Morocco, April 7-9, pp. 1-5. IEEE, New Jersey, USA
-
(2011)
Enhanced EPR Data Protection Using Cryptography, and Digital Watermarking
, pp. 1-5
-
-
Zaz, Y.1
Fadil, L.2
-
25
-
-
79960762009
-
-
2011 Conf. Network, and Information Systems Security (SAR-SSI La Rochelle, France, May 18-21 IEEE, New Jersey, USA
-
Schick, R., and Ruland, C. (2011). Document Tracking -on the Way to a New Security Service. 2011 Conf. Network, and Information Systems Security (SAR-SSI), La Rochelle, France, May 18-21, pp. 1-5. IEEE, New Jersey, USA
-
(2011)
Document Tracking -on the Way to A New Security Service
, pp. 1-5
-
-
Schick, R.1
Ruland, C.2
-
26
-
-
84985922619
-
Tracing traitors
-
Desmedt, Y. (ed Springer, Berlin, Germany
-
Chor, B., Fiat, A., and Naor, M. (1994). Tracing Traitors. In Desmedt, Y. (ed.), Advances in Cryptology -CRYPTO?94, Lecture Notes in Computer Science 839, pp. 257-270. Springer, Berlin, Germany
-
(1994)
Advances in Cryptology -CRYPTO?94, Lecture Notes in Computer Science
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
28
-
-
84976219767
-
-
The 1st Int. Workshop on Information Hiding, Cambridge, UK, May 30-June 1 Springer, Berlin
-
Handel, T.G., and Sandford II, M.T. (1996). Hiding Data in the OSI Network Model. The 1st Int. Workshop on Information Hiding, Cambridge, UK, May 30-June 1, pp. 23-38. Springer, Berlin
-
(1996)
Hiding Data in the OSI Network Model
, pp. 23-38
-
-
Handel, T.G.1
Sandford, I.I.M.T.2
-
29
-
-
84857824081
-
-
2011 Nirma University Int. Conf. Engineering (NUiCONE India, December 8-10 IEEE, New Jersey, USA
-
Shah, M., and Patel, S. (2011). Network based Packet Watermarking using TCP/IP Protocol Suite. 2011 Nirma University Int. Conf. Engineering (NUiCONE), India, December 8-10, pp. 1-5. IEEE, New Jersey, USA
-
(2011)
Network Based Packet Watermarking Using TCP/IP Protocol Suite
, pp. 1-5
-
-
Shah, M.1
Patel, S.2
-
30
-
-
79952848974
-
-
The 2nd Annual ACM Conf. Multimedia Systems, MMSys?11, San Jose, CA, USA, February 23-25 ACM, New York, NY, USA
-
Hartung, F., Kesici, S., and Catrein, D. (2011). DRM Protected Dynamic Adaptive http Streaming. The 2nd Annual ACM Conf. Multimedia Systems, MMSys?11, San Jose, CA, USA, February 23-25, pp. 277-282. ACM, New York, NY, USA
-
(2011)
DRM Protected Dynamic Adaptive Http Streaming
, pp. 277-282
-
-
Hartung, F.1
Kesici, S.2
Catrein, D.3
-
31
-
-
33646062624
-
Data hiding in identification, and offset IP fields
-
Ramos, F., Larios Rosillo, V., and Unger, H. (eds Springer, Berlin, Germany
-
Cauich, E., Gómez Cárdenas, R., and Watanabe, R. (2005). Data Hiding in Identification, and Offset IP Fields. In Ramos, F., Larios Rosillo, V., and Unger, H. (eds), Advanced Distributed Systems, Lecture Notes in Computer Science 3563, pp. 118-125. Springer, Berlin, Germany
-
(2005)
Advanced Distributed Systems, Lecture Notes in Computer Science
, vol.3563
, pp. 118-125
-
-
Cauich, E.1
Gómez Cárdenas, R.2
Watanabe, R.3
-
32
-
-
84892411476
-
-
Technical Report. University of St, and rews, Scotland, UK
-
Llamas, D., Allison, C., and Miller, A. (2006). Covert Channels in Internet Protocols: A Survey. Technical Report. University of St, and rews, Scotland, UK
-
(2006)
Covert Channels in Internet Protocols: A Survey
-
-
Llamas, D.1
Allison, C.2
Miller, A.3
-
33
-
-
84892622093
-
A collusion-resistant fingerprinting system for restricted distribution of digital documents
-
Munoz-Hernandez, M.D., Garcia-Hernandez, J.J., and Morales-Sandoval, M. (2013). A collusion-resistant fingerprinting system for restricted distribution of digital documents. PLoS ONE, 8, 1-14
-
(2013)
Plos One
, vol.8
, pp. 1-14
-
-
Munoz-Hernandez, M.D.1
Garcia-Hernandez, J.J.2
Morales-Sandoval, M.3
-
34
-
-
79955003733
-
Hierarchical spread spectrum fingerprinting scheme based on CDMA technique
-
Kuribayashi, M. (2011). Hierarchical spread spectrum fingerprinting scheme based on CDMA technique. EURASIP J. Inf. Secur., 2011, 1-16
-
(2011)
EURASIP J. Inf. Secur
, vol.2011
, pp. 1-16
-
-
Kuribayashi, M.1
-
35
-
-
84949922490
-
-
The 9th Int. Conf. Int. Technology, and Secured Transactions (ICITST-2014 London, UK, December 8-10 IEEE, New Jersey, USA
-
Munoz-Hernandez, M.D., Garcia-Hernandez, J.J., and Morales-Sandoval, M. (2014). Study on the Robustness to Retyping Attacks of Fingerprinted Digital Documents in the Frequential Domain. The 9th Int. Conf. Int. Technology, and Secured Transactions (ICITST-2014), London, UK, December 8-10, pp. 25-30. IEEE, New Jersey, USA
-
(2014)
Study on the Robustness to Retyping Attacks of Fingerprinted Digital Documents in the Frequential Domain
, pp. 25-30
-
-
Munoz-Hernandez, M.D.1
Garcia-Hernandez, J.J.2
Morales-Sandoval, M.3
-
36
-
-
84892577047
-
-
Adobe White Paper. Adobe Systems Incorporated. accessed September 28, 2013
-
Adobe (2010) Making the case PDF/A, and Adobe Acrobat. White Paper. Adobe Systems Incorporated. http://goo.gl/F4ZkL (accessed September 28, 2013
-
(2010)
Making the Case PDF/A, and Adobe Acrobat
-
-
-
37
-
-
84982299178
-
Contract lifecycle management
-
accessed September 28, 2013
-
Gupta, R., Karayil, A., and Rajendran, R. (2008). Contract lifecycle management. White paper. Infosys. http://goo.gl/aEQj9 (accessed September 28, 2013
-
(2008)
White Paper. Infosys
-
-
Gupta, R.1
Karayil, A.2
Rajendran, R.3
-
39
-
-
12444337118
-
-
2nd edn). Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
Adams, C., and Lloyd, S. (2002). Understanding PKI: Concepts, Standards, and Deployment Considerations (2nd edn). Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
(2002)
Understanding PKI: Concepts, Standards, and Deployment Considerations
-
-
Adams, C.1
Lloyd, S.2
-
40
-
-
67649210855
-
Image encryption using DCT, and stream cipher
-
Krikor, L., Baba, S., Arif, T., and Shaaban, Z. (2009). Image encryption using DCT, and stream cipher. Eur. J. Sci. Res., 32, 48-58
-
(2009)
Eur. J. Sci. Res
, vol.32
, pp. 48-58
-
-
Krikor, L.1
Baba, S.2
Arif, T.3
Shaaban, Z.4
-
41
-
-
84982275844
-
A taxonomy of cryptographic techniques for securing electronic identity documents
-
Pohlmann, N., Reimer, H., and Schneider, W. (eds Springer, Germany
-
Schmeh, K. (2010). A Taxonomy of Cryptographic Techniques for Securing Electronic Identity Documents. In Pohlmann, N., Reimer, H., and Schneider, W. (eds), Securing Electronic Business Processes. Springer, Germany
-
(2010)
Securing Electronic Business Processes
-
-
Schmeh, K.1
-
42
-
-
77957253382
-
-
2nd Int. Conf. Signal Processing Systems (ICSPS Dalian, July 5-7 IEEE, New Jersey, USA
-
Zhao, G., Yang, X., Zhou, B., and Wei, W. (2010). RSA-based Digital Image Encryption Algorithm in Wireless Sensor Networks. 2nd Int. Conf. Signal Processing Systems (ICSPS), Dalian, July 5-7, pp.640-643. IEEE, New Jersey, USA
-
(2010)
RSA-based Digital Image Encryption Algorithm in Wireless Sensor Networks
, pp. 640-643
-
-
Zhao, G.1
Yang, X.2
Zhou, B.3
Wei, W.4
-
43
-
-
70350552320
-
-
Tekanpur, India, July 23-25 IEEE, New Jersey, USA
-
Gupta, K., Silakari, S., Gupta, R., and Khan, S. (2009). An Ethical Way of Image Encryption using ECC. First Int. Conf. Computational Intelligence, Communication Systems, and Networks, Tekanpur, India, July 23-25, pp. 342-345. IEEE, New Jersey, USA
-
(2009)
An Ethical Way of Image Encryption Using ECC First Int Conf Computational Intelligence, Communication Systems, and Networks
, pp. 342-345
-
-
Gupta, K.1
Silakari, S.2
Gupta, R.3
Khan, S.4
-
44
-
-
0017930809
-
A method for obtaining digital signatures, and public-key cryptosystems
-
Rivest, R.L., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures, and public-key cryptosystems. Commun. ACM, 21, 120-126
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
45
-
-
78650240174
-
The advanced encryption standard
-
Stallings, W. (2002). The advanced encryption standard. Cryptologia, 26, 165-188
-
(2002)
Cryptologia
, vol.26
, pp. 165-188
-
-
Stallings, W.1
-
46
-
-
84982291173
-
-
National Institute of Standards Technology (NIST FIPS PUB 180-2
-
National Institute of Standards Technology (NIST) (2002) SHA-2 standard. FIPS PUB 180-2
-
(2002)
SHA-2 Standard
-
-
-
47
-
-
84863493834
-
-
Technical Report. National Institute of Standards, and Technology, Gaithersburg, MD, United States
-
Barker, E.B., and Roginsky, A.L. (2013). Transitions: Recommendation for Transitioning the use of Cryptographic Algorithms, and Key Lengths. Technical Report. National Institute of Standards, and Technology, Gaithersburg, MD, United States
-
(2013)
Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms, and Key Lengths
-
-
Barker, E.B.1
Roginsky, A.L.2
-
48
-
-
20744449792
-
The design, and implementation of FFTW3
-
Frigo, M., and Johnson, S. (2005). The design, and implementation of FFTW3. Proc. IEEE, 93, 216-231
-
(2005)
Proc. IEEE
, vol.93
, pp. 216-231
-
-
Frigo, M.1
Johnson, S.2
-
49
-
-
84982313171
-
-
accessed September 25, 2014
-
FrankWarmerdam, M.W., Kiselev, A., and Kelly, D. (2014). TIFF library, and utilities. http://www.libtiff.org/(accessed September 25, 2014
-
(2014)
TIFF Library, and Utilities
-
-
FrankWarmerdam, M.W.1
Kiselev, A.2
Kelly, D.3
-
50
-
-
84982296893
-
-
Independent JPEG Group accessed September 25, 2014
-
Independent JPEG Group (2014) Libjpeg. http://www.ijg.org/(accessed September 25, 2014
-
(2014)
Libjpeg
-
-
-
51
-
-
0003880013
-
-
Addison-Wesley UK
-
Gamma, E., Helm, R., Johnson, R., and Vlissides, J. (1994). Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, UK.
-
(1994)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
|