- Documento3D RECONSTRUCTION OF FACIAL STRUCTURES FROM 2D IMAGES FOR COSMETIC SURGERYenviado porShaka Technologies
- DocumentoTwitter data analysis and visualizations using the R language on top of the Hadoop platform.docxenviado porShaka Technologies
- DocumentoTwo Step Verification System of Highly Secure Social Media Possible to Breach the Security (2)enviado porShaka Technologies
- DocumentoTruthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Cloudsenviado porShaka Technologies
- DocumentoTrack Summary Report for the Data Exploration in the Web 3.0 Age DEWenviado porShaka Technologies
- DocumentoTowards Approximating the Mean Time to Failure in Vehicular Cloudsenviado porShaka Technologies
- DocumentoTime Table Generationenviado porShaka Technologies
- DocumentoThe Classification Techniques on Medical Data to Predict Heart Diseaseenviado porShaka Technologies
- DocumentoTask Scheduling in Cloud Computingenviado porShaka Technologies
- DocumentoTASCTopic-Adaptive Sentiment Classification on Dynamic Tweetsenviado porShaka Technologies
- DocumentoSuspect Verification Based on Indian Law Systemenviado porShaka Technologies
- DocumentoStrategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Controlenviado porShaka Technologies
- DocumentoSmart Grid Solution for Charging and Discharging Services Based on Cloud Computing Schedulingenviado porShaka Technologies
- DocumentoSmart Governance Through Bigdata Digital Transformation of Public Agenciesenviado porShaka Technologies
- DocumentoSecure Distributed Deduplication Systems With Improved Reliabilityenviado porShaka Technologies
- DocumentoSecure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryptionenviado porShaka Technologies
- DocumentoSecure Cloud Storage Meets With Secure Network Codingenviado porShaka Technologies
- DocumentoSecure Auditing and Deduplicating Data in Cloudenviado porShaka Technologies
- DocumentoSecure and Efficient Cloud Computing Frameworkenviado porShaka Technologies
- DocumentoSalty Secret Let Us Secretly Salt the Secretenviado porShaka Technologies
- DocumentoReview Based Service Recommendation for Big Dataenviado porShaka Technologies
- DocumentoResource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computingenviado porShaka Technologies
- DocumentoRecent Advances in Autonomic Provisioning of Big Data Applications on Cloudsenviado porShaka Technologies
- DocumentoQoS-Aware Data Replications and Placements for Query Evaluation of Big Data Analyticsenviado porShaka Technologies
- DocumentoPrivacy-preserving Search Over Encrypted Personal Health Record in Multi-Source Cloud (2)enviado porShaka Technologies
- DocumentoPrivacy-Preserving Detection of Sensitive Data Exposureenviado porShaka Technologies
- DocumentoPrivacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharingenviado porShaka Technologies
- DocumentoPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computingenviado porShaka Technologies
- DocumentoPrivacy Preserving Data Analysis in Mental Health Researchenviado porShaka Technologies
- DocumentoPerformance-Oriented Deployment of Streaming Applications on Cloudenviado porShaka Technologies
- DocumentoEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)enviado porShaka Technologies
- DocumentoImplementation of DNA Cryptography in Cloud Computing and Using Socket Programmingenviado porShaka Technologies
- DocumentoAn Adjunct Hash Neighbor in 4way MANETS to Share Data Efficientlyenviado porShaka Technologies
- DocumentoAn Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approachenviado porShaka Technologies
- DocumentoProactive & Time-Optimized Data Synopsis Management at the Edgeenviado porShaka Technologies
- DocumentoProactive & Time-Optimized Data Synopsis Management at the Edgeenviado porShaka Technologies
- DocumentoEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)enviado porShaka Technologies
- DocumentoECL-EKM an Enhanced Certificateless Effective Key Management Protocol for Dynamic WSNenviado porShaka Technologies
- DocumentoDROPS Division and Replication of Data in Cloud for Optimal Performance and Securityenviado porShaka Technologies
- DocumentoA Hybrid Data Mining Method for Tunnel Engineering Based on Real-Time Monitoring Data From Tunnel Boring Machinesenviado porShaka Technologies
- DocumentoDistributed Storage Design for Encrypted Network Intrusion Record (DSeNiR) (2)enviado porShaka Technologies
- DocumentoDeleting Secret Data With Public Verifiabilityenviado porShaka Technologies
- DocumentoFailure Management for Reliable Cloud Computing a Taxonomy, Model, And Future Directionsenviado porShaka Technologies
- DocumentoDeduplication on Encrypted Big Data in Cloudenviado porShaka Technologies
- DocumentoCryptographic Public Verification of Data Integrity for Cloud Storage Systemsenviado porShaka Technologies
- DocumentoEnergy-Efficient Hybrid Framework for Green Cloud Computingenviado porShaka Technologies
- DocumentoCryptMDB a Practical Encrypted MongoDB Over Big Dataenviado porShaka Technologies
- DocumentoCricket Data Analysis & Predictionenviado porShaka Technologies
- DocumentoCost-Effective Authentic and Anonymous Data Sharing With Forward Securityenviado porShaka Technologies