Your search returned 40 results. Subscribe to this search

Not what you expected? Check for suggestions
|
Enhanced privavcy preservation and security in health information through anonymization using cryptographic mechanism by Patil Deepali (submitted by) Publication: . 47, Availability: No items available:
Selective data consistency model by Kushwaha Jayant (submitted by) Publication: Availability: No items available:
Discover compability: machine learning way. by Ahire Pritam Ramesh (submitted by) Publication: . vii,60 Availability: No items available:
Topic model based on hybrid approach for personalized point of interest recommendation recommendationt by Rajebhosale Supriya Neelkant (submitted by) Publication: . i,41 Availability: No items available:
Analysis of traffic accident using association rule mining by Barega Selam (submitted by) Publication: . vi,53 Availability: No items available:
Robotic failure coordination in mullti robot hunting by Abraha Gebrehiwot Teklehaymanot (submitted by) Publication: . iv,66 Availability: No items available:
Implementation of different data partitioning strategies in big data stores by Babar Amrapali Murlidhar (submitted by) Publication: . ii,22 Availability: No items available:
An efficient guarded system for data transactions in decentralized disruption tolerant networks by Deshmukh Revati (submitted by) Publication: . vi,47 Availability: No items available:
Effective caching techniques for catching object queries in to collection in programming codes by Bichave Tejas J. (submitted by) Publication: . viii,45 Availability: No items available:
Eval is evil:analyzing performance of web applications based on php and javascript by static analysis by Shah Nilay (submitted by) Publication: . viii,72 Availability: No items available:
Not finding what you're looking for?