Optimal configuration of network

il y a 8 ans 224 Vues

Multiview alignment hashing for

il y a 8 ans 311 Vues

Mobile data gathering with load balanced

il y a 8 ans 284 Vues

Location aware and personalized

il y a 8 ans 210 Vues

Learning fingerprint reconstruction

il y a 8 ans 258 Vues

Key recovery attacks on kids, a keyed

il y a 8 ans 335 Vues

Improved privacy preserving p2 p multimedia

il y a 8 ans 174 Vues

Identity based distributed provable data

il y a 8 ans 235 Vues

Generating searchable public key ciphertexts

il y a 8 ans 462 Vues

Eye gaze tracking with a web camera

il y a 8 ans 760 Vues

Enabling fine grained multi-keyword search

il y a 8 ans 334 Vues

Discovery of ranking fraud for mobile apps

il y a 8 ans 1620 Vues

Detection and rectification

il y a 8 ans 209 Vues

Defeating jamming with the power of silence

il y a 8 ans 186 Vues

Control cloud data access privilege and

il y a 8 ans 325 Vues

Cloud based multimedia content protection system

il y a 8 ans 1725 Vues

Behavior rule specification based intrusion

il y a 8 ans 300 Vues

Automatic face naming by learning discriminative

il y a 8 ans 318 Vues

Authenticated key exchange protocols for parallel

il y a 8 ans 1160 Vues

An attribute assisted reranking model

il y a 8 ans 881 Vues