265 results
Search Results
2. Leverage Data Security Policies Complexity for Users: An End-to-End Storage Service Management in the Cloud Based on ABAC Attributes
3. A Securing the Data Using a Novel Security Algorithm S-RKB-22
4. Development of the Web-based Data-driven University Information Management System (UIMS) for the Inter-University Council for East Africa (IUCEA)
5. Review of Research on the Commercialization of China’s Intelligent and Connected Vehicles Industry
6. Performance Analysis of CNN and Quantized CNN Model for Rheumatoid Arthritis Identification Using Thermal Image
7. SHMEM-ML: Leveraging OpenSHMEM and Apache Arrow for Scalable, Composable Machine Learning
8. Luxury and Digital, Hindered Narratives?
9. Using KullBack-Liebler Divergence Based Meta-learning Algorithm for Few-Shot Skin Cancer Image Classification: Literature Review and a Conceptual Framework
10. A Method for Data Compression and Personal Information Suppressing in Columnar Databases
11. Augmented Reality Data Analysis for Human Needs: Subsistence, Protection, and Leisure
12. Coordination of Models for Describing and Making Agro-Technological Decisions
13. Decision Modelling in Timed Dynamic Condition Response Graphs with Data
14. Cybersecurity in Smart Cities: Technology and Data Security in Intelligent Transport Systems
15. Sammon Mapping-Based Gradient Boosted Trees for Tax Crime Prediction in the City of São Paulo
16. Improving Validity of Disaster Related Information by Identifying Correlation Among Different Social Media Streams
17. Laser Based Technology of Monitoring the Dynamic Displacements of Objects Spatial Structures
18. What Is the Evidence Base for Climate-Smart Agriculture in East and Southern Africa? A Systematic Map
19. Privacy Preserving Data Offloading Based on Transformation
20. Future Climate Projections in Africa: Where Are We Headed?
21. Research on Personalized Recommendation Case Base and Data Source Based on Case-Based Reasoning
22. Data Harvesting and Event Detection from Czech Twitter
23. Forget About Privacy … or Not?
24. The Metamodel of Heritage Preservation for Medical Big Data
25. Intercriteria Analysis over Intuitionistic Fuzzy Data
26. Use of Infrastructure-Less Network Architecture for Crowd Sourcing and Periodic Report Generation in Post Disaster Scenario
27. Understanding the Impact of Data Sparsity and Duration for Location Prediction Applications
28. Secure Storage and Processing of Confidential Data on Public Clouds
29. Product Data Management – Defining the Used Terms
30. Information Resources for the Identification of Complex Asset Condition: A Naval Engineering Case Study
31. On Big Data Benchmarking
32. Adaptive Replica Management Model for Data-Intensive Application
33. An On-demand Serialization Mechanism for Trees
34. Knowledge Dimension in Business Process Modeling
35. Massive Multiplayer Human Computation for Fun, Money, and Survival
36. Cloud Infrastructure Security
37. Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform
38. A Secured Technique for Image Data Hiding
39. Data Encoding for SDL in ITU-T Rec. Z.104
40. Data Hiding in Gray-Scale Images Using Pixel Value Differencing
41. Security and Privacy Implications of Cloud Computing – Lost in the Cloud
42. Grid Enabling Your Data Resources with OGSA-DAI
43. An Outline of the Global Grid Forum Data Access and Integration Service Specifications
44. Introduction to OGSA-DAI Services
45. How to Present Results in a Research Paper
46. Visualizing Car Cost-Effective: a Comparative Analysis of Fuel Consumption and Price for 2017 Vehicles in Australia
47. Where Is Our Data and How Is It Protected?
48. Identifying Hidden Factors for Verbal Harassment Comments on Social Media
49. Drone Technology in Perspective of Data Capturing
50. An Efficient Data Privacy Protection System Based on Differential Privacy
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.