Showing 37–48 of 52 results

  • Placeholder

    On Inference-Proof View Processing of XML Documents

    0 out of 5
    4,500

    On Inference-Proof View Processing of XML Documents Abstract? On Inference-Proof View Processing of XML Documents. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference…

  • Placeholder

    On the Impact of Software Evolution on Software Clustering

    0 out of 5
    4,500

    On the Impact of Software Evolution on Software Clustering Abstract? On the Impact of Software Evolution on Software Clustering. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=”…

  • Placeholder

    On the influence of an adaptive inference system in fuzzy rule based classification systems for imbalanced data-sets

    0 out of 5
    4,500

    On the influence of an adaptive inference system in fuzzy rule based classification systems for imbalanced data-sets Abstract? On the influence of an adaptive inference system in fuzzy rule based classification systems for imbalanced data-sets. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database…

  • Placeholder

    Optimal Route Queries with Arbitrary Order Constraints

    0 out of 5
    4,500

    Optimal Route Queries with Arbitrary Order Constraints Abstract? Optimal Route Queries with Arbitrary Order Constraints. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference…

  • Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    0 out of 5
    4,500

    Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks Abstract? Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video…

  • Placeholder

    Security and privacy for storage and computation in cloud computing

    0 out of 5
    4,500

    Security and privacy for storage and computation in cloud computing Abstract? Security and privacy for storage and computation in cloud computing. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • Placeholder

    Silhouette Analysis-Based Gait Recognition for Human Identification

    0 out of 5
    4,500

    Silhouette Analysis-Based Gait Recognition for Human Identification Abstract? Silhouette Analysis-Based Gait Recognition for Human Identification Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference…

  • SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks

    0 out of 5
    4,500

    SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks Abstract? SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File…

  • Placeholder

    Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings

    0 out of 5
    4,500

    Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings Abstract? Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Base Paper Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video…

  • Temporal Load Balancing with Service Delay Guarantee for Energy Cost Optimization in Internet Data Centers

    0 out of 5
    4,500

    Temporal Load Balancing with Service Delay Guarantee for Energy Cost Optimization in Internet Data Centers Abstract? Temporal Load Balancing with Service Delay Guarantee for Energy Cost Optimization in Internet Data Centers. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…

  • Placeholder

    Topic Mining over Asynchronous Text Sequences

    0 out of 5
    4,500

    Topic Mining over Asynchronous Text Sequences Abstract? Topic Mining over Asynchronous Text Sequences. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On…

  • Toward Trustworthy Coordination of Web Services Business Activities.

    0 out of 5
    4,500

    Toward Trustworthy Coordination of Web Services Business Activities.We present a lightweight Byzantine fault tolerance (BFT) algorithm, which can be used to render the coordination of web services business activities (WS-BA) more trustworthy. The lightweight design of the BFT algorithm is the result of a comprehensive study of the threats to the WS-BA coordination services and…

End of content

End of content