Author of the publication

Socialized Computers and Collaborative Learning.

, , , , , and . JSAI, volume 5447 of Lecture Notes in Computer Science, page 48-61. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Histogram and GLCM-based Approach for Image Copy-Move Forgery Detection., and . J. Inf. Process., (2019)An Automatic Parallelizing Compiler MIRAI with Data Distribution Function and its Runtime Support System Fagus for Distributed Memory Architecture., , , , and . PDPTA, page 1451-1457. CSREA Press, (2002)Design and Implementation of the Loop Restructuring Feature for the MIRAI Parallelizing Complier., , , , and . PDPTA, page 1134-1140. CSREA Press, (2003)Copy-Move Forgery Detection: A State-of-the-Art Technical Review and Analysis., and . IEEE Access, (2019)Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA., , , , and . Secur. Commun. Networks, (2021)An Agent-Based Approach to Evaluation of Workflow Support Systems., , , , , , and . C5, page 51-55. IEEE Computer Society, (2010)A Turing Machine-Based Model for Computer Forensic Reconstruction., , and . SSIRI, page 289-290. IEEE Computer Society, (2009)IP Multicast Video Broadcasting System with User Authentication., , , and . ICME, page 1186-1189. IEEE Computer Society, (2005)Development of Intellectual Network Forensic System LIFT against Targeted Attacks., , , , , , , and . CyberSec, page 16-21. IEEE Computer Society, (2015)An Extended Benchmark System of Word Embedding Methods for Vulnerability Detection., , and . ICFNDS, page 54:1-54:8. ACM, (2020)