Super User

Enhancements of A Three-Party Password-Based Authenticated Key Exchange Protocol

Shuhua Wu 1,2,3 , Kefei
Written by

Medical Image Segmentation using a Multi-Agent System Approach

Mahsa Chitsaz and Woo
Written by

Submesh Allocation in 2D-Mesh Multicomputers:
Partitioning at the Longest Dimension of Requests

Written by

Applying Artificial Neural Network and eXtended Classifier System for Network Intrusion Detection
 (ANNXCS-NID)

<
Written by

Query Dispatching Tool Supporting Fast Access to Data Warehouse

Anmar Aljanabi1, Alaa
Written by

A Technique for Handling Range and Fuzzy Match Queries on Encrypted Data

Written by

Semantic Method for Query Translation

Mohd Amin Mohd Yunus, Roziati Zainuddin, and
Written by

A Dynamic Linkage Clustering using KD-Tree

Shadi Abudalfa1 and Mohammad Mikki2
1
Written by

Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities

Written by

Implementing New Approach for Enhancing Performance and Throughput in A Distributed Database

Written by
Page 56 of 170

Upcoming courses

Has no item to show!

Free courses

Starting from Jun. 14 2016

the degree finder

in 3 easy steps
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…