chennaisunday.tn

@chennaisunday.tn
7:41
Robust watermarking Of Compressed And Encrypted Jpeg2000 Images
11 years ago
6:31
Query Access Assurance In Outsourced Databases
11 years ago
4:04
Query Delay And Data Availability In MANETs
11 years ago
7:05
Preserving Integrity Of Data Public And Auditing For Data Storage Security In Cloud Computing
11 years ago
8:22
Organizing User Search History
11 years ago
5:21
Optimal Power Allocation In Multi-Relay MIMO Cooperative Networks Theory and Algorithms
11 years ago
3:40
Network Assisted Mobile Computing with Optimal Uplink
11 years ago
8:34
Joint Top-K Spatial Keyword Query Processing
11 years ago
6:40
View Invarient Action Recognition Based On Artificial Neural Networks
11 years ago
7:48
Mining Web Graphs For Recommendations
11 years ago
4:10
User Aware Image Tag Refinement Via Ternary Semantic Analysis
11 years ago
3:31
TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS
11 years ago
8:56
Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
11 years ago
5:10
Scalable Scheduling Of Updates In Streaming Data Warehouses
11 years ago
5:59
Scalable Learning Of Collective Behavior
11 years ago
5:10
Scalable Scheduling Of Updates In Streaming Data Warehouses
11 years ago
7:04
Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute Based Encryption
11 years ago
5:39
Robust Face-Name Graph Matching For Movie Character Identification
11 years ago
7:01
ROAuth Recommendation Based Open Authorization
11 years ago
4:25
Resource-Aware Application State Monitoring
11 years ago
5:08
Ranking Model Adaption For Domain Specific Search
11 years ago
7:42
Query Planning For Continuous Aggregation
11 years ago
4:04
Query Delay And Data Availability In MANETs
11 years ago
6:09
Protecting Location Privacy In Sensor Networks Against A Global Eavesdropper
11 years ago
7:52
Privacy Preserving Delegated Access Control
11 years ago
14:24
Packet Hiding Methods For Preventing Selactive Jamming Attacks
11 years ago
11:03
Outsourced Similarity Search On Metric Data Assets
11 years ago
4:52
Investigation And Analysis Of New Approach Of Intelligent Semantic Web Search Engine
11 years ago
8:36
OAuth Web Authorization Protocol
11 years ago
3:15
Measuring Code Quality To Improve Specification Mining
11 years ago