Parcourir
Présentations récentes
Recent Stories
Sujets de contenu
Contenu mis à jour
Contenu en vedette
Modèles PowerPoint
Créer
Présentation
Article
Etude
Quiz
Formulaire d'inscription
E-Book / Livres électroniques
Concepteur de la présentation
Créez une présentation époustouflante en ligne en seulement 3 étapes.
Pro
Obtenez des outils puissants pour gérer vos contenus.
Connexion
Télécharger
kaashivit
's Uploads
35 Uploads
Attributes based encryption with verifiable outsourced dec
731 vues
Random-Grid-Based Visual Cryptography Schemes
339 vues
A Framework for Periodic Outlier Pattern Detection in Time-S
183 vues
Magiclock: Scalable Detection of Potential Deadlocks in Larg
239 vues
Distance-bounding facing both mafia and distance frauds
159 vues
Mining Gene Expression Data Focusing Cancer Therapeutics: A
321 vues
Security as a Service Model for Cloud Environment
143 vues
LARS : An Efficient and Scalable Location-Aware Recommender
345 vues
SANE: Semantic-Aware Namespace in Ultra-Large-Scale File Sys
271 vues
Mining Gene Expression Data Focusing Cancer Therapeutics: A
109 vues
Traffic Pattern-Based Content Leakage Detection for Trusted
224 vues
Efficient Data Collection for Large-Scale Mobile Monitoring
594 vues
FINDING TOP-K PREFERABLE PRODUCTS
228 vues
On the use of side information for mining text data
303 vues
Intelligent Trip Modeling for the Prediction of an Origin–De
224 vues
Bayesian Networks For Evidence-Based Decision-Making in Soft
156 vues
Kernel Density Estimation, Kernel Methods, and fast learning
168 vues
CoDe Modeling of Graph Composition for Data
133 vues
Captcha as Graphical Passwords—A New Security Primitive Base
2092 vues
Data-Centric OS Kernel Malware Characterization
355 vues
Security evaluation of pattern classifiers
1013 vues
Panda: Public Auditing for Shared Data
1046 vues
Simultaneous Sparsity Model for Histopathological
136 vues
Data Hiding in Encrypted H.264/AVC Video Streams
1088 vues
Trinity: On Using Trinary Trees for Unsupervised Web
344 vues
Paper,Traffic Pattern-Based Content Leakage Detection
613 vues
Modelling the Vulnerability of Feedback-Control Based
228 vues
Operational Data Fusion Framework for Building
244 vues
A New Algorithm for Inferring User Search Goals
174 vues
An Interoperable System for Automated Diagnosis
160 vues
Localization of License Plate Number Using Dynamic Image
443 vues
Analysis of Field Data on Web Security Vulnerabilities
256 vues
Extended sub tree: a new similarity function for tree struc
131 vues
EMAP: Expedite Message Authentication Protocol for Vehicular
417 vues
Quality of Service Provision in Cloud-based Storage System f
319 vues