Collections in this community
Attacks And Mitigation In Web Browsers... [1]
Attacks And Mitigation In Web Browsers...
Extractive Automatic Text Summarization Based On Voting And Filtering Techniques... [1]
Extractive Automatic Text Summarization Based On Voting And Filtering Techniques...
Behavior-Based Dynamic Malware Detection Techniques... [1]
Behavior-Based Dynamic Malware Detection Techniques...
Techniques For Analysis And Detection Of Android Malware... [1]
Techniques For Analysis And Detection Of Android Malware...
Classification of Malignant Brain Tumors using MRI by Machine Learning... [1]
Classification of Malignant Brain Tumors using MRI by Machine Learning...
Evidence Gathering and Language Alignment in Question Answering... [1]
Evidence Gathering and Language Alignment in Question Answering...
Efficient Techniques for Intrusion Detection in Cloud Environment... [1]
Efficient Techniques for Intrusion Detection in Cloud Environment...
Detection of security vulnerabilities using static Analysis and machine learning techniques... [1]
Detection of security vulnerabilities using static Analysis and machine learning techniques...
Design of highly adaptive and fault-tolerant routing for Networks-on-chip... [1]
Design of highly adaptive and fault-tolerant routing for Networks-on-chip...
Spectrum and path aware routing in cognitive radio Wireless mesh networks... [1]
Spectrum and path aware routing in cognitive radio Wireless mesh networks...
QoS–aware Multicast Routing Protocols in MANETs... [1]
QoS–aware Multicast Routing Protocols in MANETs...
Machine Learning Techniques For Vision Based Human Gait Analysis... [1]
Machine Learning Techniques For Vision Based Human Gait Analysis...
Analysis Techniques For Intra And Inter App(s) In Android... [1]
Analysis Techniques For Intra And Inter App(s) In Android...
Secread: Security-Aware Requirements Elicitation, Assessment And Design Methodology... [1]
Secread: Security-Aware Requirements Elicitation, Assessment And Design Methodology...
Aspect Oriented Approach For Testing Software Applications And Automatic Aspect Creation... [1]
Aspect Oriented Approach For Testing Software Applications And Automatic Aspect Creation...
Nonchronological Video Synopsis And Indexing... [1]
Nonchronological Video Synopsis And Indexing...
Secret Sharing Schemes For Multimedia Data... [1]
Secret Sharing Schemes For Multimedia Data...
Ddos Attacks In Cloud Computing... [1]
Ddos Attacks In Cloud Computing...
Architectural Improvements For Secure Sdn Topology Discovery… [1]
Architectural Improvements For Secure Sdn Topology Discovery…
Salient Object Detection In Both Clean And Noisy Images… [1]
Salient Object Detection In Both Clean And Noisy Images…
Facial Expression Recognition System Using Discriminant Features… [1]
Facial Expression Recognition System Using Discriminant Features…
Query Translation And Disambiguation Approaches For Cross-Lingual Information Retrieval… [1]
Query Translation And Disambiguation Approaches For Cross-Lingual Information Retrieval…
Design And development Of Devanagari Script Handwritten Text Corpus With Annotation… [1]
Design And development Of Devanagari Script Handwritten Text Corpus With Annotation…
Crowd Density Estimation And Analysis… [1]
Crowd Density Estimation And Analysis…
Exploration Of Energy Efficient Manycore Networks-on-chip Architectures… [1]
Exploration Of Energy Efficient Manycore Networks-on-chip Architectures…
Reliability-aware Analysis And Design Of Network-on-chip… [1]
Reliability-aware Analysis And Design Of Network-on-chip…
Discover
- 26 true