Product | Details | Total |
---|---|---|
![]() | Swiper Exploiting Virtual Machine Vulnerability in Third-Party Rs3,000.00 Swiper: Exploiting Virtual Machine Vulnerability In Third-Party Clouds with Competition for I/O Resources. The… | Rs3,000.00 |
![]() | Best peer Peer to peer Based large scale data processing platform Rs3,000.00 Bestpeer++:Peer to peer Based large scale data processing platform. The corporate network is often used… | Rs3,000.00 |
![]() | Backward Path Growth for Efficient Mobile Sequential Recommendation Rs3,000.00 Recommender systems are commonly defined as applications that e-commerce sites exploit to suggest products and… | Rs3,000.00 |
![]() | A 65 nm Cryptographic Processor for High Speed Pairing Computation Rs3,500.00 Cryptographic processors are becoming the… | Rs3,500.00 |
Cart totals
Add a coupon
SubtotalRs12,500.00
9% CGSTRs1,125.00
9% SGSTRs1,125.00
Total
Rs14,750.00