- Документ3D RECONSTRUCTION OF FACIAL STRUCTURES FROM 2D IMAGES FOR COSMETIC SURGERYзагружено:Shaka Technologies
- ДокументTwitter data analysis and visualizations using the R language on top of the Hadoop platform.docxзагружено:Shaka Technologies
- ДокументTwo Step Verification System of Highly Secure Social Media Possible to Breach the Security (2)загружено:Shaka Technologies
- ДокументTruthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Cloudsзагружено:Shaka Technologies
- ДокументTrack Summary Report for the Data Exploration in the Web 3.0 Age DEWзагружено:Shaka Technologies
- ДокументTowards Approximating the Mean Time to Failure in Vehicular Cloudsзагружено:Shaka Technologies
- ДокументTime Table Generationзагружено:Shaka Technologies
- ДокументThe Classification Techniques on Medical Data to Predict Heart Diseaseзагружено:Shaka Technologies
- ДокументTask Scheduling in Cloud Computingзагружено:Shaka Technologies
- ДокументTASCTopic-Adaptive Sentiment Classification on Dynamic Tweetsзагружено:Shaka Technologies
- ДокументSuspect Verification Based on Indian Law Systemзагружено:Shaka Technologies
- ДокументStrategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Controlзагружено:Shaka Technologies
- ДокументSmart Grid Solution for Charging and Discharging Services Based on Cloud Computing Schedulingзагружено:Shaka Technologies
- ДокументSmart Governance Through Bigdata Digital Transformation of Public Agenciesзагружено:Shaka Technologies
- ДокументSecure Distributed Deduplication Systems With Improved Reliabilityзагружено:Shaka Technologies
- ДокументSecure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryptionзагружено:Shaka Technologies
- ДокументSecure Cloud Storage Meets With Secure Network Codingзагружено:Shaka Technologies
- ДокументSecure Auditing and Deduplicating Data in Cloudзагружено:Shaka Technologies
- ДокументSecure and Efficient Cloud Computing Frameworkзагружено:Shaka Technologies
- ДокументSalty Secret Let Us Secretly Salt the Secretзагружено:Shaka Technologies
- ДокументReview Based Service Recommendation for Big Dataзагружено:Shaka Technologies
- ДокументResource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computingзагружено:Shaka Technologies
- ДокументRecent Advances in Autonomic Provisioning of Big Data Applications on Cloudsзагружено:Shaka Technologies
- ДокументQoS-Aware Data Replications and Placements for Query Evaluation of Big Data Analyticsзагружено:Shaka Technologies
- ДокументPrivacy-preserving Search Over Encrypted Personal Health Record in Multi-Source Cloud (2)загружено:Shaka Technologies
- ДокументPrivacy-Preserving Detection of Sensitive Data Exposureзагружено:Shaka Technologies
- ДокументPrivacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharingзагружено:Shaka Technologies
- ДокументPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computingзагружено:Shaka Technologies
- ДокументPrivacy Preserving Data Analysis in Mental Health Researchзагружено:Shaka Technologies
- ДокументPerformance-Oriented Deployment of Streaming Applications on Cloudзагружено:Shaka Technologies
- ДокументEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)загружено:Shaka Technologies
- ДокументImplementation of DNA Cryptography in Cloud Computing and Using Socket Programmingзагружено:Shaka Technologies
- ДокументAn Adjunct Hash Neighbor in 4way MANETS to Share Data Efficientlyзагружено:Shaka Technologies
- ДокументAn Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approachзагружено:Shaka Technologies
- ДокументProactive & Time-Optimized Data Synopsis Management at the Edgeзагружено:Shaka Technologies
- ДокументProactive & Time-Optimized Data Synopsis Management at the Edgeзагружено:Shaka Technologies
- ДокументEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)загружено:Shaka Technologies
- ДокументECL-EKM an Enhanced Certificateless Effective Key Management Protocol for Dynamic WSNзагружено:Shaka Technologies
- ДокументDROPS Division and Replication of Data in Cloud for Optimal Performance and Securityзагружено:Shaka Technologies
- ДокументA Hybrid Data Mining Method for Tunnel Engineering Based on Real-Time Monitoring Data From Tunnel Boring Machinesзагружено:Shaka Technologies
- ДокументDistributed Storage Design for Encrypted Network Intrusion Record (DSeNiR) (2)загружено:Shaka Technologies
- ДокументDeleting Secret Data With Public Verifiabilityзагружено:Shaka Technologies
- ДокументFailure Management for Reliable Cloud Computing a Taxonomy, Model, And Future Directionsзагружено:Shaka Technologies
- ДокументDeduplication on Encrypted Big Data in Cloudзагружено:Shaka Technologies
- ДокументCryptographic Public Verification of Data Integrity for Cloud Storage Systemsзагружено:Shaka Technologies
- ДокументEnergy-Efficient Hybrid Framework for Green Cloud Computingзагружено:Shaka Technologies
- ДокументCryptMDB a Practical Encrypted MongoDB Over Big Dataзагружено:Shaka Technologies
- ДокументCricket Data Analysis & Predictionзагружено:Shaka Technologies
- ДокументCost-Effective Authentic and Anonymous Data Sharing With Forward Securityзагружено:Shaka Technologies