Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
Product Compare (0)
High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one ..
We here introduce a novel classification approach
adopted from the nonlinear model identification f..
Virtualization is an essential step before a baremetal data center being ready for commercial usage,..
Temporal data contain time-stamping information
that affects the results of data mining. Traditiona..
There are a number of research challenges
associated with Internet of Things (IoT) security, and on..
With the growing amount of data, the demand of big data storage significantly increases. Through the..
In the Infrastructure as a Service (IaaS) paradigm of cloud computing, computational resources are a..
Active learning is a process whereby students engage in activities, such as reading, writing, discus..
Duty cycling (DC) is a popular technique for energy
conservation in wireless sensor networks that a..
This paper presents a hybrid intelligent system
(HIS) for risk assessment based on unstructured inf..
How to control the access of the huge amount of
big data becomes a very challenging issue, especial..
How to control the access of the huge amount of big
data becomes a very challenging issue, especia..
Online shopping is becoming more and more common in our daily lives. Understanding users’ interests ..
In healthcare management, a large volume of multi-structured patient data is generated from the clin..