×
Preventing Phishing Attack On Voting System Using Visual Cryptography
599
Preventing Phishing Attack On Voting System Using Visual Cryptography quantity
599
×
Corrosion Mechanism, Prevention and Repair Measures of RCC Structure
599
Corrosion Mechanism, Prevention and Repair Measures of RCC Structure quantity
599
×
Fraud in Insurance
599
Fraud in Insurance quantity
599
×
Inventory Control Procedures in Manufacturing Organizations
599
Inventory Control Procedures in Manufacturing Organizations quantity
599
×
Achieving Fairness aware Two Level Scheduling for Heterogeneous Distributed Systems
599
Achieving Fairness aware Two Level Scheduling for Heterogeneous Distributed Systems quantity
599
×
A Hierarchical Control Framework of Load Balancing and Resource Allocation of Cloud Computing Services
599
A Hierarchical Control Framework of Load Balancing and Resource Allocation of Cloud Computing Services quantity
599
×
Web Content Trust Rating Prediction Using Evidence Theory
599
Web Content Trust Rating Prediction Using Evidence Theory quantity
599
×
Effective decompression of JPEG document images
599
Effective decompression of JPEG document images quantity
599
×
Impact of Brand Positioning on Consumer Learning and Brand Loyalty
599
Impact of Brand Positioning on Consumer Learning and Brand Loyalty quantity
599
×
Deep 3D Convolutional Encoder Networks with Shortcuts for Multiscale Feature Integration Applied to Multiple Sclerosis Lesion Segmentation
599
Deep 3D Convolutional Encoder Networks with Shortcuts for Multiscale Feature Integration Applied to Multiple Sclerosis Lesion Segmentation quantity
599
×
A Robust Formulation for Efficient Application Offloading to Clouds
599
A Robust Formulation for Efficient Application Offloading to Clouds quantity
599
×
A Robust Reputation Management Mechanism in the Federated Cloud
599
A Robust Reputation Management Mechanism in the Federated Cloud quantity
599
Coupon: Apply coupon
Update cart