Product | Details | Total |
---|---|---|
![]() | Preserving Location Privacy in Geosocial Applications Rs3,000.00 Preserving Location Privacy in Geosocial Applications. In geosocial applications, such as Foursquare, millions of people… | Rs3,000.00 |
![]() | TRACON Interference-Aware Scheduling for Data-Intensive Applications in Virtualized Environments Rs3,000.00 TRACON: Interference-Aware Schedulingfor Data-Intensive Applicationsin Virtualized Environments. Large-scale data centers leverage virtualization technology to achieve… | Rs3,000.00 |
![]() | Economizing TSV Resources in 3-D Network-on-Chip Design Rs3,500.00 Three dimensional Networks-on-Chip (3D NoCs) have attracted a growing interest to solve on-chip communication demands… | Rs3,500.00 |
![]() | Set Matching Measures for External Cluster Validity DOTNET Rs4,500.00 Comparing two clustering results of a data set is a challenging task in cluster analysis… | Rs4,500.00 |
![]() | Large Scale Multi Cluster MIMO Approach for Cognitive Radio Sensor Networks Rs4,500.00 This Process proposes a large-scale cooperative multiple-input multiple-output (CMIMO) beamforming scheme for uplink (UL) access… | Rs4,500.00 |
![]() | Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk Rs4,500.00 We propose to use maximal entropy random walk on a graph for tampering localization… | Rs4,500.00 |
![]() | Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud Rs3,000.00 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. With data… | Rs3,000.00 |