- Documento3D RECONSTRUCTION OF FACIAL STRUCTURES FROM 2D IMAGES FOR COSMETIC SURGERYcaricato daShaka Technologies
- DocumentoTwitter data analysis and visualizations using the R language on top of the Hadoop platform.docxcaricato daShaka Technologies
- DocumentoTwo Step Verification System of Highly Secure Social Media Possible to Breach the Security (2)caricato daShaka Technologies
- DocumentoTruthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Cloudscaricato daShaka Technologies
- DocumentoTrack Summary Report for the Data Exploration in the Web 3.0 Age DEWcaricato daShaka Technologies
- DocumentoTowards Approximating the Mean Time to Failure in Vehicular Cloudscaricato daShaka Technologies
- DocumentoTime Table Generationcaricato daShaka Technologies
- DocumentoThe Classification Techniques on Medical Data to Predict Heart Diseasecaricato daShaka Technologies
- DocumentoTask Scheduling in Cloud Computingcaricato daShaka Technologies
- DocumentoTASCTopic-Adaptive Sentiment Classification on Dynamic Tweetscaricato daShaka Technologies
- DocumentoSuspect Verification Based on Indian Law Systemcaricato daShaka Technologies
- DocumentoStrategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Controlcaricato daShaka Technologies
- DocumentoSmart Grid Solution for Charging and Discharging Services Based on Cloud Computing Schedulingcaricato daShaka Technologies
- DocumentoSmart Governance Through Bigdata Digital Transformation of Public Agenciescaricato daShaka Technologies
- DocumentoSecure Distributed Deduplication Systems With Improved Reliabilitycaricato daShaka Technologies
- DocumentoSecure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryptioncaricato daShaka Technologies
- DocumentoSecure Cloud Storage Meets With Secure Network Codingcaricato daShaka Technologies
- DocumentoSecure Auditing and Deduplicating Data in Cloudcaricato daShaka Technologies
- DocumentoSecure and Efficient Cloud Computing Frameworkcaricato daShaka Technologies
- DocumentoSalty Secret Let Us Secretly Salt the Secretcaricato daShaka Technologies
- DocumentoReview Based Service Recommendation for Big Datacaricato daShaka Technologies
- DocumentoResource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computingcaricato daShaka Technologies
- DocumentoRecent Advances in Autonomic Provisioning of Big Data Applications on Cloudscaricato daShaka Technologies
- DocumentoQoS-Aware Data Replications and Placements for Query Evaluation of Big Data Analyticscaricato daShaka Technologies
- DocumentoPrivacy-preserving Search Over Encrypted Personal Health Record in Multi-Source Cloud (2)caricato daShaka Technologies
- DocumentoPrivacy-Preserving Detection of Sensitive Data Exposurecaricato daShaka Technologies
- DocumentoPrivacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharingcaricato daShaka Technologies
- DocumentoPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computingcaricato daShaka Technologies
- DocumentoPrivacy Preserving Data Analysis in Mental Health Researchcaricato daShaka Technologies
- DocumentoPerformance-Oriented Deployment of Streaming Applications on Cloudcaricato daShaka Technologies
- DocumentoEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)caricato daShaka Technologies
- DocumentoImplementation of DNA Cryptography in Cloud Computing and Using Socket Programmingcaricato daShaka Technologies
- DocumentoAn Adjunct Hash Neighbor in 4way MANETS to Share Data Efficientlycaricato daShaka Technologies
- DocumentoAn Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approachcaricato daShaka Technologies
- DocumentoProactive & Time-Optimized Data Synopsis Management at the Edgecaricato daShaka Technologies
- DocumentoProactive & Time-Optimized Data Synopsis Management at the Edgecaricato daShaka Technologies
- DocumentoEfficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage (2)caricato daShaka Technologies
- DocumentoECL-EKM an Enhanced Certificateless Effective Key Management Protocol for Dynamic WSNcaricato daShaka Technologies
- DocumentoDROPS Division and Replication of Data in Cloud for Optimal Performance and Securitycaricato daShaka Technologies
- DocumentoA Hybrid Data Mining Method for Tunnel Engineering Based on Real-Time Monitoring Data From Tunnel Boring Machinescaricato daShaka Technologies
- DocumentoDistributed Storage Design for Encrypted Network Intrusion Record (DSeNiR) (2)caricato daShaka Technologies
- DocumentoDeleting Secret Data With Public Verifiabilitycaricato daShaka Technologies
- DocumentoFailure Management for Reliable Cloud Computing a Taxonomy, Model, And Future Directionscaricato daShaka Technologies
- DocumentoDeduplication on Encrypted Big Data in Cloudcaricato daShaka Technologies
- DocumentoCryptographic Public Verification of Data Integrity for Cloud Storage Systemscaricato daShaka Technologies
- DocumentoEnergy-Efficient Hybrid Framework for Green Cloud Computingcaricato daShaka Technologies
- DocumentoCryptMDB a Practical Encrypted MongoDB Over Big Datacaricato daShaka Technologies
- DocumentoCricket Data Analysis & Predictioncaricato daShaka Technologies
- DocumentoCost-Effective Authentic and Anonymous Data Sharing With Forward Securitycaricato daShaka Technologies