Super User

Privacy Preserving K-means Clustering: A Survey Research

Fatima Meskine1 and Safia Nait
Written by

An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks

Written by

A Cross-Layer Based Intrusion Detection Technique for Wireless Networks

Jatinder Singh1, Lakhwinder
Written by

An Effective Data Warehousing System for RFID using Novel Data Cleaning, Data Transformation and Loading Techniques

Written by

Neural Disparity Map Estimation from Stereo Image

Nadia Baha and Slimane Larabi<
Written by

A Novel Radon-Wavelet-based Multi-Carrier Code Division Multiple Access Transceiver Design and Simulation under Different Channel Conditions

Written by

Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems

Written by

Comparison of Genetic Algorithm and Quantum Genetic Algorithm

Zakaria Laboudi and Salim
Written by

A Hybrid Approach for Urdu Sentence Boundary Disambiguation

Zobia Rehman, Waqas
Written by

Facile Programming

Hanan Elazhary
Computers and Systems Department, Electronics Research Institute,
Written by
Page 48 of 170
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…