Super User

Enhancements of A Three-Party Password-Based Authenticated Key Exchange Protocol

Shuhua Wu 1,2,3 , Kefei
Written by

Medical Image Segmentation using a Multi-Agent System Approach

Mahsa Chitsaz and Woo
Written by

Submesh Allocation in 2D-Mesh Multicomputers:
Partitioning at the Longest Dimension of Requests

Written by

Applying Artificial Neural Network and eXtended Classifier System for Network Intrusion Detection
 (ANNXCS-NID)

<
Written by

Query Dispatching Tool Supporting Fast Access to Data Warehouse

Anmar Aljanabi1, Alaa
Written by

A Technique for Handling Range and Fuzzy Match Queries on Encrypted Data

Written by

Semantic Method for Query Translation

Mohd Amin Mohd Yunus, Roziati Zainuddin, and
Written by

A Dynamic Linkage Clustering using KD-Tree

Shadi Abudalfa1 and Mohammad Mikki2
1
Written by

Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities

Written by

Implementing New Approach for Enhancing Performance and Throughput in A Distributed Database

Written by
Page 56 of 170
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…