- Document3D RECONSTRUCTION OF FACIAL STRUCTURES FROM 2D IMAGES FOR COSMETIC SURGERYuploaded byShaka Technologies
- DocumentTwitter data analysis and visualizations using the R language on top of the Hadoop platform.docxuploaded byShaka Technologies
- DocumentTwo Step Verification System of Highly Secure Social Media Possible to Breach the Security (2)uploaded byShaka Technologies
- DocumentTruthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Cloudsuploaded byShaka Technologies
- DocumentTrack Summary Report for the Data Exploration in the Web 3.0 Age DEWuploaded byShaka Technologies
- DocumentTowards Approximating the Mean Time to Failure in Vehicular Cloudsuploaded byShaka Technologies
- DocumentTime Table Generationuploaded byShaka Technologies
- DocumentThe Classification Techniques on Medical Data to Predict Heart Diseaseuploaded byShaka Technologies
- DocumentTask Scheduling in Cloud Computinguploaded byShaka Technologies
- DocumentTASCTopic-Adaptive Sentiment Classification on Dynamic Tweetsuploaded byShaka Technologies
- DocumentSuspect Verification Based on Indian Law Systemuploaded byShaka Technologies
- DocumentStrategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Controluploaded byShaka Technologies
- DocumentSmart Grid Solution for Charging and Discharging Services Based on Cloud Computing Schedulinguploaded byShaka Technologies
- DocumentSmart Governance Through Bigdata Digital Transformation of Public Agenciesuploaded byShaka Technologies
- DocumentSecure Distributed Deduplication Systems With Improved Reliabilityuploaded byShaka Technologies
- DocumentSecure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryptionuploaded byShaka Technologies
- DocumentSecure Cloud Storage Meets With Secure Network Codinguploaded byShaka Technologies
- DocumentSecure Auditing and Deduplicating Data in Clouduploaded byShaka Technologies
- DocumentSecure and Efficient Cloud Computing Frameworkuploaded byShaka Technologies
- DocumentSalty Secret Let Us Secretly Salt the Secretuploaded byShaka Technologies
- DocumentReview Based Service Recommendation for Big Datauploaded byShaka Technologies
- DocumentResource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computinguploaded byShaka Technologies
- DocumentRecent Advances in Autonomic Provisioning of Big Data Applications on Cloudsuploaded byShaka Technologies
- DocumentQoS-Aware Data Replications and Placements for Query Evaluation of Big Data Analyticsuploaded byShaka Technologies
- DocumentPrivacy-preserving Search Over Encrypted Personal Health Record in Multi-Source Cloud (2)uploaded byShaka Technologies
- DocumentPrivacy-Preserving Detection of Sensitive Data Exposureuploaded byShaka Technologies
- DocumentPrivacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharinguploaded byShaka Technologies
- DocumentPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computinguploaded byShaka Technologies
- DocumentPrivacy Preserving Data Analysis in Mental Health Researchuploaded byShaka Technologies
- DocumentPerformance-Oriented Deployment of Streaming Applications on Clouduploaded byShaka Technologies
- DocumentEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)uploaded byShaka Technologies
- DocumentImplementation of DNA Cryptography in Cloud Computing and Using Socket Programminguploaded byShaka Technologies
- DocumentAn Adjunct Hash Neighbor in 4way MANETS to Share Data Efficientlyuploaded byShaka Technologies
- DocumentAn Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approachuploaded byShaka Technologies
- DocumentProactive & Time-Optimized Data Synopsis Management at the Edgeuploaded byShaka Technologies
- DocumentProactive & Time-Optimized Data Synopsis Management at the Edgeuploaded byShaka Technologies
- DocumentEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)uploaded byShaka Technologies
- DocumentECL-EKM an Enhanced Certificateless Effective Key Management Protocol for Dynamic WSNuploaded byShaka Technologies
- DocumentDROPS Division and Replication of Data in Cloud for Optimal Performance and Securityuploaded byShaka Technologies
- DocumentA Hybrid Data Mining Method for Tunnel Engineering Based on Real-Time Monitoring Data From Tunnel Boring Machinesuploaded byShaka Technologies
- DocumentDistributed Storage Design for Encrypted Network Intrusion Record (DSeNiR) (2)uploaded byShaka Technologies
- DocumentDeleting Secret Data With Public Verifiabilityuploaded byShaka Technologies
- DocumentFailure Management for Reliable Cloud Computing a Taxonomy, Model, And Future Directionsuploaded byShaka Technologies
- DocumentDeduplication on Encrypted Big Data in Clouduploaded byShaka Technologies
- DocumentCryptographic Public Verification of Data Integrity for Cloud Storage Systemsuploaded byShaka Technologies
- DocumentEnergy-Efficient Hybrid Framework for Green Cloud Computinguploaded byShaka Technologies
- DocumentCryptMDB a Practical Encrypted MongoDB Over Big Datauploaded byShaka Technologies
- DocumentCricket Data Analysis & Predictionuploaded byShaka Technologies
- DocumentCost-Effective Authentic and Anonymous Data Sharing With Forward Securityuploaded byShaka Technologies