Sei sulla pagina 1di 1

1

2 3 4 6

Generic lossless visible Watermarkinga new approach Data Leakage Detection Description: Data allocation strategies that improve the probability of identifying leakages and develop a model for assessing the guilt of agents. That improves chances of identifying a leaker Vide: a vision-based approach for deep Web data extraction Bridging the semantic gap between Image contents and tags Distributed Computing For E-Learning Bridging domains using worldwide knowledge for Transfer learning Description: A novel transfer learning approach, called BIG (Bridging Information Gap), to effectively extract useful knowledge in a worldwide knowledge base, which is then used to link the source and target domains for improving the classification performance. In-depth packet inspection using a hierarchical Pattern matching algorithm. Practical management and standard Administrative system Voting systems with trust mechanisms in Cyberspace:vulnerabilities and defenses Predictive Network Anomaly Detection And Visualization Multidlmentional Supression For K-Anonymity Propositional Share Market Hierarchical Advertising Estimation System Network Traffic Monitor Online Ticket Booking Customer Relationship Management Scaling Byzantine Fault-Tolerant Replication To Wide Area Networks

2010 2010

2010 2010 2010 2010

7 8 9 10 11 12 13 14 15 16 17 18

2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010

Potrebbero piacerti anche