Digital Library
Search Results: [ keyword: graph ] (175)
Shung Han Cho,
Yunyoung Nam,
Sangjin Hong,
Weduke Cho,
Vol. 4, No. 3, June 29, 2010
10.3837/tiis.2010.06.010
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Axel Poschmann,
Matthew J.B. Robshaw,
Frank Vater,
Christof Paar,
Vol. 4, No. 2, April 28, 2010
10.3837/tiis.2010.04.002
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
53.
Topology Preserving Tetrahedral Decomposition Applied To Trilinear Interval Volume Tetrahedrization
Jeong Ok Kwon,
Ik Rae Jeong,
Dong Hoon Lee,
Vol. 2, No. 6, December 24, 2008
10.3837/tiis.2008.06.003
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Khaled H. Abuhmaidan,
Marwan A. Al-Share,
Abdallah M. Abualkishik,
Ahmad Kayed,
Vol. 18, No. 6, June 30, 2024
10.3837/tiis.2024.06.011
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Shahid Saleem,
Saif U. R. Malik,
Bilal Mehboob,
Roobaea Alroobaea,
Sultan Algarni,
Abdullah M. Baqasah,
Naveed Ahmad,
Muhammad Hasnain,
Vol. 18, No. 3, March 31, 2024
10.3837/tiis.2024.03.006
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
59.
New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption
Mohammed Abdul Majeed,
Rossilawati Sulaiman,
Zarina Shukur,
Vol. 18, No. 1, January 31, 2024
10.3837/tiis.2024.01.010
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
60.
An Uncertain Graph Method Based on Node Random Response to Preserve Link Privacy of Social Networks
Jun Yan,
Jiawang Chen,
Yihui Zhou,
Zhenqiang Wu,
Laifeng Lu,
Vol. 18, No. 1, January 31, 2024
10.3837/tiis.2024.01.009
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)