Anuradha, A.
-
Vol 5, No 7 (2017): July - Articles
CRA - Aided Authentication for a Large Amount Of Various Cloud Services
Abstract
PDF [Full Text]
-
Vol 5, No 7 (2017): July - Articles
Enabling the Fusion Of Local Sensitivity And Low Rank Factorization To Mitigate The Risk Of Over Fitting
Abstract
PDF [Full Text]
-
Vol 5, No 7 (2017): July - Articles
To Improve The Inference Capability Using Traces From WSN Deployments
Abstract
PDF [Full Text]
-
Vol 5, No 7 (2017): July - Articles
The Revocation Mechanism Of A Be Scheme Into Asymmetric GKA
Abstract
PDF [Full Text]
-
Vol 5, No 7 (2017): July - Articles
Key Distribution And Privacy Preserving In An Access Controlled Cloud Computing
Abstract
PDF [Full Text]
-
Vol 5, No 7 (2017): July - Articles
Path Planning By Caching To Avoid Shortest Path Computation
Abstract
PDF [Full Text]
-
Vol 5, No 7 (2017): July - Articles
An Optimal Combination of Diverse Distance Metrics On Multiple Modalities
Abstract
PDF [ Full Text]
-
Vol 5, No 7 (2017): July - Articles
An Access Control Scheme for The WBNS Using Sign Signcryption
Abstract
PDF [Full Text]
-
Vol 5, No 7 (2017): July - Articles
Node Failure Detection And Fault Management In Mobile Wireless Networks With Persistent Connectivity
Abstract
PDF [Full Text]
-
Vol 5, No 7 (2017): July - Articles
Open API Service To Generate CDA Documents Based On Cloud Computing
Abstract
PDF [Full Text]
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.