Parcourir
Présentations récentes
Recent Stories
Sujets de contenu
Contenu mis à jour
Contenu en vedette
Modèles PowerPoint
Créer
Présentation
Article
Etude
Quiz
Formulaire d'inscription
E-Book / Livres électroniques
Concepteur de la présentation
Créez une présentation époustouflante en ligne en seulement 3 étapes.
Pro
Obtenez des outils puissants pour gérer vos contenus.
Connexion
Télécharger
kaashivit
's Uploads
35 Uploads
Attributes based encryption with verifiable outsourced dec
716 vues
Random-Grid-Based Visual Cryptography Schemes
311 vues
A Framework for Periodic Outlier Pattern Detection in Time-S
167 vues
Magiclock: Scalable Detection of Potential Deadlocks in Larg
226 vues
Distance-bounding facing both mafia and distance frauds
147 vues
Mining Gene Expression Data Focusing Cancer Therapeutics: A
307 vues
Security as a Service Model for Cloud Environment
130 vues
LARS : An Efficient and Scalable Location-Aware Recommender
334 vues
SANE: Semantic-Aware Namespace in Ultra-Large-Scale File Sys
251 vues
Mining Gene Expression Data Focusing Cancer Therapeutics: A
101 vues
Traffic Pattern-Based Content Leakage Detection for Trusted
217 vues
Efficient Data Collection for Large-Scale Mobile Monitoring
573 vues
FINDING TOP-K PREFERABLE PRODUCTS
214 vues
On the use of side information for mining text data
285 vues
Intelligent Trip Modeling for the Prediction of an Origin–De
208 vues
Bayesian Networks For Evidence-Based Decision-Making in Soft
137 vues
Kernel Density Estimation, Kernel Methods, and fast learning
157 vues
CoDe Modeling of Graph Composition for Data
121 vues
Captcha as Graphical Passwords—A New Security Primitive Base
2064 vues
Data-Centric OS Kernel Malware Characterization
336 vues
Security evaluation of pattern classifiers
982 vues
Panda: Public Auditing for Shared Data
1030 vues
Simultaneous Sparsity Model for Histopathological
126 vues
Data Hiding in Encrypted H.264/AVC Video Streams
1059 vues
Trinity: On Using Trinary Trees for Unsupervised Web
333 vues
Paper,Traffic Pattern-Based Content Leakage Detection
600 vues
Modelling the Vulnerability of Feedback-Control Based
212 vues
Operational Data Fusion Framework for Building
231 vues
A New Algorithm for Inferring User Search Goals
158 vues
An Interoperable System for Automated Diagnosis
142 vues
Localization of License Plate Number Using Dynamic Image
422 vues
Analysis of Field Data on Web Security Vulnerabilities
234 vues
Extended sub tree: a new similarity function for tree struc
108 vues
EMAP: Expedite Message Authentication Protocol for Vehicular
398 vues
Quality of Service Provision in Cloud-based Storage System f
309 vues