Abstract :
The following topics are dealt with:software watermarking algorithm; register allocation; fuzzy principal component analysis; gait recognition; intrusion detection; BIBD code; anticollision fingerprint; artificial neural network; information hiding algorithm; color image; logistics distribution simulation; Web mining; support vector machines; pseudo random sequence; DS-CDMA signals; fuzzy set theory; signature verification; Web services; differential fault analysis; software cost estimation; distributed system design; educational management information system; RFID authentication protocols; data extraction; e-learning; network security audit system; and group decision making.
Keywords :
Web services; auditing; computer aided instruction; data mining; decision making; fuzzy set theory; gait analysis; handwriting recognition; image colour analysis; logistics; management information systems; neural nets; optimising compilers; principal component analysis; radiofrequency identification; random sequences; security of data; software cost estimation; support vector machines; watermarking; BIBD code; DS-CDMA signals; RFID authentication protocols; Web mining; Web services; anticollision fingerprint; artificial neural network; color image; data extraction; differential fault analysis; distributed system design; e-learning; educational management information system; fuzzy principal component analysis; fuzzy set theory; gait recognition; group decision making; information hiding algorithm; information system security; intrusion detection; logistics distribution simulation; network security audit system; pseudo random sequence; register allocation; signature verification; software cost estimation; software watermarking algorithm; support vector machines;
Conference_Titel :
e-Business and Information System Security (EBISS), 2010 2nd International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5893-6
DOI :
10.1109/EBISS.2010.5473661