Lecture Notes in Computer Science

Lecture Notes in Computer Science

ISSNs: 0302-9743

Additional searchable ISSN (Electronic): 1611-3349

Springer, Germany

Scopus rating (2019): CiteScore 1.9 SJR 0.427 SNIP 0.776

Journal

Journal Metrics

Research Output

  1. 2005
  2. Published

    Adaptive smoothing neural networks in foreign exchange rate forecasting

    Yu, L., Wang, S. & Lai, K. K., 2005, In : Lecture Notes in Computer Science. 3516, III, p. 523-530

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 28
    Check@CityULib
  3. Published

    A heuristic search for relevant images on the web

    Yu, F., Ip, H. H. S. & Leung, C. H., 2005, In : Lecture Notes in Computer Science. 3568, p. 599-608

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 3
    Check@CityULib
  4. Published

    A Hopfiled neural network for nonlinear constrained optimization problems based on penalty function

    Meng, Z. & Dang, C., 2005, In : Lecture Notes in Computer Science. 3496, I, p. 712-717

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 1
    Check@CityULib
  5. Published

    An approximation algorithm for embedding a directed hypergraph on a ring

    Li, K. & Wang, L., 2005, In : Lecture Notes in Computer Science. 3521, p. 392-399

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Check@CityULib
  6. Published

    An Efficient Algorithm for Computing Optimal Discrete Voltage Schedules

    Li, M. & Yao, F. F., 2005, In : Lecture Notes in Computer Science. 3618, p. 652-663

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 4
    Check@CityULib
  7. An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems

    Sun, H., Lam, K., Chung, S., Gu, M. & Sun, J., 2005, In : Lecture Notes in Computer Science. 3619, p. 817-825

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Check@CityULib
  8. Published

    An example-based study on Chinese word segmentation using critical fragments

    Hu, Q., Pan, H. & Kit, C., 2005, In : Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). 3248, p. 714-722

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Check@CityULib
  9. Published

    A pattern-based voting approach for concept discovery on the web

    Chen, J., Zhang, Z., Li, Q. & Li, X., 2005, In : Lecture Notes in Computer Science. 3399, p. 109-120

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 4
    Check@CityULib
  10. Application of Content Computing in Honeyfarm

    Huang, Y., Lam, K., Chung, S., Chi, C. & Sun, J., 2005, In : Lecture Notes in Computer Science. 3325, p. 211-222

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Check@CityULib
  11. Published

    A restricted multi-show credential system and its application on e-voting

    Liu, J. K. & Wong, D. S., 2005, In : Lecture Notes in Computer Science. 3439, p. 268-279

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 3
    Check@CityULib
  12. Published

    A two-stage recourse model for production planning with stochastic demand

    Lai, K. K., Leung, S. C. H. & Wu, Y., 2005, In : Lecture Notes in Computer Science. 3483, IV, p. 250-260

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Check@CityULib
  13. Published

    Chi-square goodness-of-fit test of 3D point correspondence for model similarity measure and analysis

    Feng, J. & Ip, H. H. S., 2005, In : Lecture Notes in Computer Science. 3568, p. 445-453

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 4
    Check@CityULib
  14. Published

    Chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher

    Li, C., Li, S., Zhang, D. & Chen, G., 2005, In : Lecture Notes in Computer Science. 3497, II, p. 630-636

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 12
    Check@CityULib
  15. Published

    Complexity of minimal tree routing and coloring

    Chen, X., Hu, X. & Jia, X., 2005, In : Lecture Notes in Computer Science. 3521, p. 6-15

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 1
    Check@CityULib
  16. Published

    Continuous Residual Energy Monitoring in Wireless Sensor Networks

    Han, S. & Chan, E., 2005, In : Lecture Notes in Computer Science. 3358, p. 169-177

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 8
    Check@CityULib
  17. Published

    Control chaos in brushless DC motor via piecewise quadratic state feedback

    Ren, H. P. & Chen, G., 2005, In : Lecture Notes in Computer Science. 3645, PART II, p. 149-158

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 9
    Check@CityULib
  18. Published

    Custodian-hiding verifiable encryption

    Liu, J. K., Wei, V. K. & Wong, D. S., 2005, In : Lecture Notes in Computer Science. 3325, p. 51-64

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 3
    Check@CityULib
  19. Published

    Data caching in selfish MANETs

    Zhai, J., Li, Q. & Li, X., 2005, In : Lecture Notes in Computer Science. 3619, p. 208-217

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 6
    Check@CityULib
  20. Published

    Deposit-case attack against secure roaming

    Yang, G., Wong, D. S. & Deng, X., 2005, In : Lecture Notes in Computer Science. 3574, p. 417-428

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 8
    Check@CityULib
  21. Published

    Deputy mechanism for workflow views

    Shan, Z., Li, Q., Luo, Y. & Peng, Z., 2005, In : Lecture Notes in Computer Science. 3453, p. 816-827

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 2
    Check@CityULib
Previous 1 2 3 4 5 6 7 8 ...11 Next