Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
Product Compare (0)
High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one ..
We here introduce a novel classification approach adopted from the nonlinear model identification f..
Virtualization is an essential step before a baremetal data center being ready for commercial usage,..
Temporal data contain time-stamping information that affects the results of data mining. Traditiona..
There are a number of research challenges associated with Internet of Things (IoT) security, and on..
With the growing amount of data, the demand of big data storage significantly increases. Through the..
In the Infrastructure as a Service (IaaS) paradigm of cloud computing, computational resources are a..
Active learning is a process whereby students engage in activities, such as reading, writing, discus..
Duty cycling (DC) is a popular technique for energy conservation in wireless sensor networks that a..
This paper presents a hybrid intelligent system (HIS) for risk assessment based on unstructured inf..
How to control the access of the huge amount of big data becomes a very challenging issue, especial..
How to control the access of the huge amount of big data becomes a very challenging issue, especia..
Online shopping is becoming more and more common in our daily lives. Understanding users’ interests ..
In healthcare management, a large volume of multi-structured patient data is generated from the clin..
Automated page speed optimizations for fast site performance
: Trying to access array offset on value of type null in on line : Trying to access array offset on value of type null in on line