|
× |
|
Preventing Phishing Attack On Voting System Using Visual Cryptography |
599 |
|
599 |
|
× |
|
Corrosion Mechanism, Prevention and Repair Measures of RCC Structure |
599 |
|
599 |
|
× |
|
Fraud in Insurance |
599 |
|
599 |
|
× |
|
Inventory Control Procedures in Manufacturing Organizations |
599 |
|
599 |
|
× |
|
Achieving Fairness aware Two Level Scheduling for Heterogeneous Distributed Systems |
599 |
|
599 |
|
× |
|
A Hierarchical Control Framework of Load Balancing and Resource Allocation of Cloud Computing Services |
599 |
|
599 |
|
× |
|
Web Content Trust Rating Prediction Using Evidence Theory |
599 |
|
599 |
|
× |
|
Effective decompression of JPEG document images |
599 |
|
599 |
|
× |
|
Challenges in Implementation of an ERP System |
599 |
|
599 |
|
|