- Dokumen3D RECONSTRUCTION OF FACIAL STRUCTURES FROM 2D IMAGES FOR COSMETIC SURGERYdiunggah olehShaka Technologies
- DokumenTwitter data analysis and visualizations using the R language on top of the Hadoop platform.docxdiunggah olehShaka Technologies
- DokumenTwo Step Verification System of Highly Secure Social Media Possible to Breach the Security (2)diunggah olehShaka Technologies
- DokumenTruthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Cloudsdiunggah olehShaka Technologies
- DokumenTrack Summary Report for the Data Exploration in the Web 3.0 Age DEWdiunggah olehShaka Technologies
- DokumenTowards Approximating the Mean Time to Failure in Vehicular Cloudsdiunggah olehShaka Technologies
- DokumenTime Table Generationdiunggah olehShaka Technologies
- DokumenThe Classification Techniques on Medical Data to Predict Heart Diseasediunggah olehShaka Technologies
- DokumenTask Scheduling in Cloud Computingdiunggah olehShaka Technologies
- DokumenTASCTopic-Adaptive Sentiment Classification on Dynamic Tweetsdiunggah olehShaka Technologies
- DokumenSuspect Verification Based on Indian Law Systemdiunggah olehShaka Technologies
- DokumenStrategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Controldiunggah olehShaka Technologies
- DokumenSmart Grid Solution for Charging and Discharging Services Based on Cloud Computing Schedulingdiunggah olehShaka Technologies
- DokumenSmart Governance Through Bigdata Digital Transformation of Public Agenciesdiunggah olehShaka Technologies
- DokumenSecure Distributed Deduplication Systems With Improved Reliabilitydiunggah olehShaka Technologies
- DokumenSecure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryptiondiunggah olehShaka Technologies
- DokumenSecure Cloud Storage Meets With Secure Network Codingdiunggah olehShaka Technologies
- DokumenSecure Auditing and Deduplicating Data in Clouddiunggah olehShaka Technologies
- DokumenSecure and Efficient Cloud Computing Frameworkdiunggah olehShaka Technologies
- DokumenSalty Secret Let Us Secretly Salt the Secretdiunggah olehShaka Technologies
- DokumenReview Based Service Recommendation for Big Datadiunggah olehShaka Technologies
- DokumenResource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computingdiunggah olehShaka Technologies
- DokumenRecent Advances in Autonomic Provisioning of Big Data Applications on Cloudsdiunggah olehShaka Technologies
- DokumenQoS-Aware Data Replications and Placements for Query Evaluation of Big Data Analyticsdiunggah olehShaka Technologies
- DokumenPrivacy-preserving Search Over Encrypted Personal Health Record in Multi-Source Cloud (2)diunggah olehShaka Technologies
- DokumenPrivacy-Preserving Detection of Sensitive Data Exposurediunggah olehShaka Technologies
- DokumenPrivacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharingdiunggah olehShaka Technologies
- DokumenPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computingdiunggah olehShaka Technologies
- DokumenPrivacy Preserving Data Analysis in Mental Health Researchdiunggah olehShaka Technologies
- DokumenPerformance-Oriented Deployment of Streaming Applications on Clouddiunggah olehShaka Technologies
- DokumenEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)diunggah olehShaka Technologies
- DokumenImplementation of DNA Cryptography in Cloud Computing and Using Socket Programmingdiunggah olehShaka Technologies
- DokumenAn Adjunct Hash Neighbor in 4way MANETS to Share Data Efficientlydiunggah olehShaka Technologies
- DokumenAn Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approachdiunggah olehShaka Technologies
- DokumenProactive & Time-Optimized Data Synopsis Management at the Edgediunggah olehShaka Technologies
- DokumenProactive & Time-Optimized Data Synopsis Management at the Edgediunggah olehShaka Technologies
- DokumenEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)diunggah olehShaka Technologies
- DokumenECL-EKM an Enhanced Certificateless Effective Key Management Protocol for Dynamic WSNdiunggah olehShaka Technologies
- DokumenDROPS Division and Replication of Data in Cloud for Optimal Performance and Securitydiunggah olehShaka Technologies
- DokumenA Hybrid Data Mining Method for Tunnel Engineering Based on Real-Time Monitoring Data From Tunnel Boring Machinesdiunggah olehShaka Technologies
- DokumenDistributed Storage Design for Encrypted Network Intrusion Record (DSeNiR) (2)diunggah olehShaka Technologies
- DokumenDeleting Secret Data With Public Verifiabilitydiunggah olehShaka Technologies
- DokumenFailure Management for Reliable Cloud Computing a Taxonomy, Model, And Future Directionsdiunggah olehShaka Technologies
- DokumenDeduplication on Encrypted Big Data in Clouddiunggah olehShaka Technologies
- DokumenCryptographic Public Verification of Data Integrity for Cloud Storage Systemsdiunggah olehShaka Technologies
- DokumenEnergy-Efficient Hybrid Framework for Green Cloud Computingdiunggah olehShaka Technologies
- DokumenCryptMDB a Practical Encrypted MongoDB Over Big Datadiunggah olehShaka Technologies
- DokumenCricket Data Analysis & Predictiondiunggah olehShaka Technologies
- DokumenCost-Effective Authentic and Anonymous Data Sharing With Forward Securitydiunggah olehShaka Technologies