Parcourir
Présentations récentes
Recent Stories
Sujets de contenu
Contenu mis à jour
Contenu en vedette
Modèles PowerPoint
Créer
Présentation
Article
Etude
Quiz
Formulaire d'inscription
E-Book / Livres électroniques
Concepteur de la présentation
Créez une présentation époustouflante en ligne en seulement 3 étapes.
Pro
Obtenez des outils puissants pour gérer vos contenus.
Connexion
Télécharger
kaashivit
's Uploads
35 Uploads
Attributes based encryption with verifiable outsourced dec
734 vues
Random-Grid-Based Visual Cryptography Schemes
341 vues
A Framework for Periodic Outlier Pattern Detection in Time-S
186 vues
Magiclock: Scalable Detection of Potential Deadlocks in Larg
240 vues
Distance-bounding facing both mafia and distance frauds
160 vues
Mining Gene Expression Data Focusing Cancer Therapeutics: A
323 vues
Security as a Service Model for Cloud Environment
145 vues
LARS : An Efficient and Scalable Location-Aware Recommender
347 vues
SANE: Semantic-Aware Namespace in Ultra-Large-Scale File Sys
272 vues
Mining Gene Expression Data Focusing Cancer Therapeutics: A
111 vues
Traffic Pattern-Based Content Leakage Detection for Trusted
225 vues
Efficient Data Collection for Large-Scale Mobile Monitoring
595 vues
FINDING TOP-K PREFERABLE PRODUCTS
230 vues
On the use of side information for mining text data
305 vues
Intelligent Trip Modeling for the Prediction of an Origin–De
226 vues
Bayesian Networks For Evidence-Based Decision-Making in Soft
157 vues
Kernel Density Estimation, Kernel Methods, and fast learning
170 vues
CoDe Modeling of Graph Composition for Data
136 vues
Captcha as Graphical Passwords—A New Security Primitive Base
2093 vues
Data-Centric OS Kernel Malware Characterization
358 vues
Security evaluation of pattern classifiers
1016 vues
Panda: Public Auditing for Shared Data
1048 vues
Simultaneous Sparsity Model for Histopathological
138 vues
Data Hiding in Encrypted H.264/AVC Video Streams
1090 vues
Trinity: On Using Trinary Trees for Unsupervised Web
345 vues
Paper,Traffic Pattern-Based Content Leakage Detection
619 vues
Modelling the Vulnerability of Feedback-Control Based
231 vues
Operational Data Fusion Framework for Building
246 vues
A New Algorithm for Inferring User Search Goals
175 vues
An Interoperable System for Automated Diagnosis
163 vues
Localization of License Plate Number Using Dynamic Image
444 vues
Analysis of Field Data on Web Security Vulnerabilities
259 vues
Extended sub tree: a new similarity function for tree struc
133 vues
EMAP: Expedite Message Authentication Protocol for Vehicular
418 vues
Quality of Service Provision in Cloud-based Storage System f
320 vues