| 2008 | 
|---|
| 15 |  | Charlie Obimbo:
Approximating the Vertex Cover Problem by Selection of Nodes of Maximum Degrees for use in Wireless Sensor Networks.
FCS 2008: 256-259 | 
| 14 |  | Charlie Obimbo,
Yasser Ebrahim:
Using the HC for Shape Representation and Description.
IPCV 2008: 793-799 | 
| 13 |  | Charlie Obimbo:
An Adaptive Coding Algorithm for Secret Transmission of Information.
Security and Management 2008: 663-668 | 
| 2007 | 
|---|
| 12 | EE | Charlie Obimbo,
Behzad Salami:
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption.
The Journal of Supercomputing 39(2): 113-130 (2007) | 
| 2006 | 
|---|
| 11 |  | Charlie Obimbo,
Jingbo Ni:
A grey-level image watermarking method based on block DCT and statistic correlation adjustment.
Communication, Network, and Information Security 2006: 22-27 | 
| 10 |  | Behzad Salami,
Charlie Obimbo:
A multi-bitwatermark generation algorithm with properties of error correction.
Communication, Network, and Information Security 2006: 44-49 | 
| 9 |  | Charlie Obimbo,
Liliana M. Arboleda C.,
Yunfeng Chen:
A Watchdog Enhancement to IDS in MANET.
Wireless and Optical Communications 2006 | 
| 2005 | 
|---|
| 8 |  | Charlie Obimbo:
A Parallel Algorithm For Determining The Inverse Of A Matrix For Use In Block Cipher Encryption And Decryption.
CSC 2005: 164-172 | 
| 7 |  | Charlie Obimbo,
Nhi Tonnu:
A System That Can Enhance E-Business In The Developing World.
CSREA EEE 2005: 68-74 | 
| 6 |  | Anthony Koso,
Andrew Turi,
Charlie Obimbo:
Embedding Digital Signatures in MP3s.
IMSA 2005: 271-274 | 
| 5 |  | Ming Xu,
Behzad Salami,
Charlie Obimbo:
How to Protect Personal Information against Keyloggers.
IMSA 2005: 275-280 | 
| 2004 | 
|---|
| 4 |  | Gary William Grewal,
Ming Xu,
Charlie Obimbo:
An Approximate Solution for Steiner Trees in Multicast Routing.
IC-AI 2004: 707-711 | 
| 3 |  | Charlie Obimbo,
Rohit Makhijani:
An Online Linking System for Researchers.
International Conference on Internet Computing 2004: 455-458 | 
| 2 |  | Charlie Obimbo,
Stephen Doxsee:
The Threat of a Deterministic Polynomial Time Algorithm for Primality Testing in Applied Cryptography.
MSV/AMCS 2004: 423-426 | 
| 2003 | 
|---|
| 1 |  | Gary William Grewal,
Mike O'Cleirigh,
Charlie Obimbo:
Hierarchical Genetic Algorithms Applied to Datapath Synthesis.
IC-AI 2003: 994-1002 |