Parcourir
Présentations récentes
Recent Stories
Sujets de contenu
Contenu mis à jour
Contenu en vedette
Modèles PowerPoint
Créer
Présentation
Article
Etude
Quiz
Formulaire d'inscription
E-Book / Livres électroniques
Concepteur de la présentation
Créez une présentation époustouflante en ligne en seulement 3 étapes.
Pro
Obtenez des outils puissants pour gérer vos contenus.
Connexion
Télécharger
kaashivit
's Uploads
35 Uploads
Attributes based encryption with verifiable outsourced dec
736 vues
Random-Grid-Based Visual Cryptography Schemes
344 vues
A Framework for Periodic Outlier Pattern Detection in Time-S
190 vues
Magiclock: Scalable Detection of Potential Deadlocks in Larg
242 vues
Distance-bounding facing both mafia and distance frauds
161 vues
Mining Gene Expression Data Focusing Cancer Therapeutics: A
324 vues
Security as a Service Model for Cloud Environment
147 vues
LARS : An Efficient and Scalable Location-Aware Recommender
348 vues
SANE: Semantic-Aware Namespace in Ultra-Large-Scale File Sys
274 vues
Mining Gene Expression Data Focusing Cancer Therapeutics: A
112 vues
Traffic Pattern-Based Content Leakage Detection for Trusted
227 vues
Efficient Data Collection for Large-Scale Mobile Monitoring
597 vues
FINDING TOP-K PREFERABLE PRODUCTS
231 vues
On the use of side information for mining text data
306 vues
Intelligent Trip Modeling for the Prediction of an Origin–De
228 vues
Bayesian Networks For Evidence-Based Decision-Making in Soft
158 vues
Kernel Density Estimation, Kernel Methods, and fast learning
171 vues
CoDe Modeling of Graph Composition for Data
137 vues
Captcha as Graphical Passwords—A New Security Primitive Base
2096 vues
Data-Centric OS Kernel Malware Characterization
359 vues
Security evaluation of pattern classifiers
1018 vues
Panda: Public Auditing for Shared Data
1049 vues
Simultaneous Sparsity Model for Histopathological
140 vues
Data Hiding in Encrypted H.264/AVC Video Streams
1091 vues
Trinity: On Using Trinary Trees for Unsupervised Web
346 vues
Paper,Traffic Pattern-Based Content Leakage Detection
621 vues
Modelling the Vulnerability of Feedback-Control Based
232 vues
Operational Data Fusion Framework for Building
247 vues
A New Algorithm for Inferring User Search Goals
176 vues
An Interoperable System for Automated Diagnosis
165 vues
Localization of License Plate Number Using Dynamic Image
446 vues
Analysis of Field Data on Web Security Vulnerabilities
260 vues
Extended sub tree: a new similarity function for tree struc
135 vues
EMAP: Expedite Message Authentication Protocol for Vehicular
419 vues
Quality of Service Provision in Cloud-based Storage System f
322 vues