“Tag Completion for image Retriveval” has been added to your cart. Continue shopping “Supporting Search-As-You-Type Using SQL in Databases” has been added to your cart. Continue shopping “Secure Sensitive Data Sharing on a Big Data Platform” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × SWIPER: EXPLOITING VIRTUAL MACHINE VULNERABILITY IN THIRD-PARTY CLOUDS WITH COMPETITION FOR I/O RESOURCES ₹4,500 SWIPER: EXPLOITING VIRTUAL MACHINE VULNERABILITY IN THIRD-PARTY CLOUDS WITH COMPETITION FOR I/O RESOURCES quantity ₹4,500 × Tag Completion for image Retriveval ₹4,500 Tag Completion for image Retriveval quantity ₹4,500 × Supporting Search-As-You-Type Using SQL in Databases ₹4,500 Supporting Search-As-You-Type Using SQL in Databases quantity ₹4,500 × Secure Sensitive Data Sharing on a Big Data Platform ₹4,500 Secure Sensitive Data Sharing on a Big Data Platform quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹18,000 Total ₹18,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout