- Document3D RECONSTRUCTION OF FACIAL STRUCTURES FROM 2D IMAGES FOR COSMETIC SURGERYtéléversé parShaka Technologies
- DocumentTwitter data analysis and visualizations using the R language on top of the Hadoop platform.docxtéléversé parShaka Technologies
- DocumentTwo Step Verification System of Highly Secure Social Media Possible to Breach the Security (2)téléversé parShaka Technologies
- DocumentTruthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Cloudstéléversé parShaka Technologies
- DocumentTrack Summary Report for the Data Exploration in the Web 3.0 Age DEWtéléversé parShaka Technologies
- DocumentTowards Approximating the Mean Time to Failure in Vehicular Cloudstéléversé parShaka Technologies
- DocumentTime Table Generationtéléversé parShaka Technologies
- DocumentThe Classification Techniques on Medical Data to Predict Heart Diseasetéléversé parShaka Technologies
- DocumentTask Scheduling in Cloud Computingtéléversé parShaka Technologies
- DocumentTASCTopic-Adaptive Sentiment Classification on Dynamic Tweetstéléversé parShaka Technologies
- DocumentSuspect Verification Based on Indian Law Systemtéléversé parShaka Technologies
- DocumentStrategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Controltéléversé parShaka Technologies
- DocumentSmart Grid Solution for Charging and Discharging Services Based on Cloud Computing Schedulingtéléversé parShaka Technologies
- DocumentSmart Governance Through Bigdata Digital Transformation of Public Agenciestéléversé parShaka Technologies
- DocumentSecure Distributed Deduplication Systems With Improved Reliabilitytéléversé parShaka Technologies
- DocumentSecure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryptiontéléversé parShaka Technologies
- DocumentSecure Cloud Storage Meets With Secure Network Codingtéléversé parShaka Technologies
- DocumentSecure Auditing and Deduplicating Data in Cloudtéléversé parShaka Technologies
- DocumentSecure and Efficient Cloud Computing Frameworktéléversé parShaka Technologies
- DocumentSalty Secret Let Us Secretly Salt the Secrettéléversé parShaka Technologies
- DocumentReview Based Service Recommendation for Big Datatéléversé parShaka Technologies
- DocumentResource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computingtéléversé parShaka Technologies
- DocumentRecent Advances in Autonomic Provisioning of Big Data Applications on Cloudstéléversé parShaka Technologies
- DocumentQoS-Aware Data Replications and Placements for Query Evaluation of Big Data Analyticstéléversé parShaka Technologies
- DocumentPrivacy-preserving Search Over Encrypted Personal Health Record in Multi-Source Cloud (2)téléversé parShaka Technologies
- DocumentPrivacy-Preserving Detection of Sensitive Data Exposuretéléversé parShaka Technologies
- DocumentPrivacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharingtéléversé parShaka Technologies
- DocumentPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computingtéléversé parShaka Technologies
- DocumentPrivacy Preserving Data Analysis in Mental Health Researchtéléversé parShaka Technologies
- DocumentPerformance-Oriented Deployment of Streaming Applications on Cloudtéléversé parShaka Technologies
- DocumentEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)téléversé parShaka Technologies
- DocumentImplementation of DNA Cryptography in Cloud Computing and Using Socket Programmingtéléversé parShaka Technologies
- DocumentAn Adjunct Hash Neighbor in 4way MANETS to Share Data Efficientlytéléversé parShaka Technologies
- DocumentAn Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approachtéléversé parShaka Technologies
- DocumentProactive & Time-Optimized Data Synopsis Management at the Edgetéléversé parShaka Technologies
- DocumentProactive & Time-Optimized Data Synopsis Management at the Edgetéléversé parShaka Technologies
- DocumentEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)téléversé parShaka Technologies
- DocumentECL-EKM an Enhanced Certificateless Effective Key Management Protocol for Dynamic WSNtéléversé parShaka Technologies
- DocumentDROPS Division and Replication of Data in Cloud for Optimal Performance and Securitytéléversé parShaka Technologies
- DocumentA Hybrid Data Mining Method for Tunnel Engineering Based on Real-Time Monitoring Data From Tunnel Boring Machinestéléversé parShaka Technologies
- DocumentDistributed Storage Design for Encrypted Network Intrusion Record (DSeNiR) (2)téléversé parShaka Technologies
- DocumentDeleting Secret Data With Public Verifiabilitytéléversé parShaka Technologies
- DocumentFailure Management for Reliable Cloud Computing a Taxonomy, Model, And Future Directionstéléversé parShaka Technologies
- DocumentDeduplication on Encrypted Big Data in Cloudtéléversé parShaka Technologies
- DocumentCryptographic Public Verification of Data Integrity for Cloud Storage Systemstéléversé parShaka Technologies
- DocumentEnergy-Efficient Hybrid Framework for Green Cloud Computingtéléversé parShaka Technologies
- DocumentCryptMDB a Practical Encrypted MongoDB Over Big Datatéléversé parShaka Technologies
- DocumentCricket Data Analysis & Predictiontéléversé parShaka Technologies
- DocumentCost-Effective Authentic and Anonymous Data Sharing With Forward Securitytéléversé parShaka Technologies