- Documento3D RECONSTRUCTION OF FACIAL STRUCTURES FROM 2D IMAGES FOR COSMETIC SURGERYcargado por
Shaka Technologies
- DocumentoTwitter data analysis and visualizations using the R language on top of the Hadoop platform.docxcargado por
Shaka Technologies
- DocumentoTwo Step Verification System of Highly Secure Social Media Possible to Breach the Security (2)cargado por
Shaka Technologies
- DocumentoTruthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Cloudscargado por
Shaka Technologies
- DocumentoTrack Summary Report for the Data Exploration in the Web 3.0 Age DEWcargado por
Shaka Technologies
- DocumentoTowards Approximating the Mean Time to Failure in Vehicular Cloudscargado por
Shaka Technologies
- DocumentoTime Table Generationcargado por
Shaka Technologies
- DocumentoThe Classification Techniques on Medical Data to Predict Heart Diseasecargado por
Shaka Technologies
- DocumentoTask Scheduling in Cloud Computingcargado por
Shaka Technologies
- DocumentoTASCTopic-Adaptive Sentiment Classification on Dynamic Tweetscargado por
Shaka Technologies
- DocumentoSuspect Verification Based on Indian Law Systemcargado por
Shaka Technologies
- DocumentoStrategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Controlcargado por
Shaka Technologies
- DocumentoSmart Grid Solution for Charging and Discharging Services Based on Cloud Computing Schedulingcargado por
Shaka Technologies
- DocumentoSmart Governance Through Bigdata Digital Transformation of Public Agenciescargado por
Shaka Technologies
- DocumentoSecure Distributed Deduplication Systems With Improved Reliabilitycargado por
Shaka Technologies
- DocumentoSecure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryptioncargado por
Shaka Technologies
- DocumentoSecure Cloud Storage Meets With Secure Network Codingcargado por
Shaka Technologies
- DocumentoSecure Auditing and Deduplicating Data in Cloudcargado por
Shaka Technologies
- DocumentoSecure and Efficient Cloud Computing Frameworkcargado por
Shaka Technologies
- DocumentoSalty Secret Let Us Secretly Salt the Secretcargado por
Shaka Technologies
- DocumentoReview Based Service Recommendation for Big Datacargado por
Shaka Technologies
- DocumentoResource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computingcargado por
Shaka Technologies
- DocumentoRecent Advances in Autonomic Provisioning of Big Data Applications on Cloudscargado por
Shaka Technologies
- DocumentoQoS-Aware Data Replications and Placements for Query Evaluation of Big Data Analyticscargado por
Shaka Technologies
- DocumentoPrivacy-preserving Search Over Encrypted Personal Health Record in Multi-Source Cloud (2)cargado por
Shaka Technologies
- DocumentoPrivacy-Preserving Detection of Sensitive Data Exposurecargado por
Shaka Technologies
- DocumentoPrivacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharingcargado por
Shaka Technologies
- DocumentoPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computingcargado por
Shaka Technologies
- DocumentoPrivacy Preserving Data Analysis in Mental Health Researchcargado por
Shaka Technologies
- DocumentoPerformance-Oriented Deployment of Streaming Applications on Cloudcargado por
Shaka Technologies
- DocumentoEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)cargado por
Shaka Technologies
- DocumentoImplementation of DNA Cryptography in Cloud Computing and Using Socket Programmingcargado por
Shaka Technologies
- DocumentoAn Adjunct Hash Neighbor in 4way MANETS to Share Data Efficientlycargado por
Shaka Technologies
- DocumentoAn Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approachcargado por
Shaka Technologies
- DocumentoProactive & Time-Optimized Data Synopsis Management at the Edgecargado por
Shaka Technologies
- DocumentoProactive & Time-Optimized Data Synopsis Management at the Edgecargado por
Shaka Technologies
- DocumentoEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)cargado por
Shaka Technologies
- DocumentoECL-EKM an Enhanced Certificateless Effective Key Management Protocol for Dynamic WSNcargado por
Shaka Technologies
- DocumentoDROPS Division and Replication of Data in Cloud for Optimal Performance and Securitycargado por
Shaka Technologies
- DocumentoA Hybrid Data Mining Method for Tunnel Engineering Based on Real-Time Monitoring Data From Tunnel Boring Machinescargado por
Shaka Technologies
- DocumentoDistributed Storage Design for Encrypted Network Intrusion Record (DSeNiR) (2)cargado por
Shaka Technologies
- DocumentoDeleting Secret Data With Public Verifiabilitycargado por
Shaka Technologies
- DocumentoFailure Management for Reliable Cloud Computing a Taxonomy, Model, And Future Directionscargado por
Shaka Technologies
- DocumentoDeduplication on Encrypted Big Data in Cloudcargado por
Shaka Technologies
- DocumentoCryptographic Public Verification of Data Integrity for Cloud Storage Systemscargado por
Shaka Technologies
- DocumentoEnergy-Efficient Hybrid Framework for Green Cloud Computingcargado por
Shaka Technologies
- DocumentoCryptMDB a Practical Encrypted MongoDB Over Big Datacargado por
Shaka Technologies
- DocumentoCricket Data Analysis & Predictioncargado por
Shaka Technologies
- DocumentoCost-Effective Authentic and Anonymous Data Sharing With Forward Securitycargado por
Shaka Technologies