Search

Your search keyword '"Gupta, Divya"' showing total 58 results

Search Constraints

Start Over You searched for: Author "Gupta, Divya" Remove constraint Author: "Gupta, Divya" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
58 results on '"Gupta, Divya"'

Search Results

4. Text Summarization Techniques for the Bengali Language: Survey

5. Unleashing the Potential: Study on Artificial Intelligence Effect in Education Sector

7. Fog-centric IoT Smart Healthcare: Architecture, Applications, and Case Study

8. Leveraging Content Based Image Retrieval Using Data Mining for Efficient Image Exploration

9. Fog-Based Smart Healthcare Architecture in IoT Environment

10. Introduction and History of Insect Biotechnology

11. Effective Communication in NDN via Transient Popular Content Caching at Edge

13. Performance Assessment and Evaluation of a 52-kW Solar PV Plant in India

14. Parameterization of a Solar Cell Using Multivariable Newton Raphson and Particle Swarm Optimization Based on Single Diode Model

16. Delay Efficient Caching in Fog Computing

19. Multi-channel Socializing—Fastening Your Social Seat Belt, Socializing 30,000 Feet Up in the Sky

21. Context-Based Quote Generation from Images

22. Towards Integration of Blockchain and Machine Learning Technologies for Security in Smart Cities

24. Performance Analysis of Caching Strategies in Information-Centric Networking

25. Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation

27. TweetsDaily: Categorised News from Twitter

28. Challenges Within the Industry 4.0 Setup

29. Caching Policies in NDN-IoT Architecture

31. Prediction and Analysis of Ecological Climatic Conditions (Humidity/Temperature) of Different Countries Fly-Ash Using Data Mining Techniques

33. Explicit Rate-1 Non-malleable Codes for Local Tampering

36. Hybrid Approach of Feature Extraction and Vector Quantization in Speech Recognition

37. Feature Extraction Techniques Based on Human Auditory System

38. The State of the Art of Feature Extraction Techniques in Speech Recognition

39. Obfuscation from Low Noise Multilinear Maps

40. Non-malleable Codes Against Lookahead Tampering

41. Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)

44. Laconic Oblivious Transfer and Its Applications

46. Secure Multiparty RAM Computation in Constant Rounds

47. Optimal Computational Split-state Non-malleable Codes

48. BFT-Bench: Towards a Practical Evaluation of Robustness and Effectiveness of BFT Protocols

49. Multi-input Functional Encryption for Unbounded Arity Functions

50. Secure Computation from Leaky Correlated Randomness

Catalog

Books, media, physical & digital resources