1:36 Analyzing and Detecting Money Laundering Accounts in Online Social Networks PONDYIT 72 views - 7 years ago
2:35 Block Design based Key Agreement for Group Data Sharing in Cloud Computing PONDYIT 94 views - 7 years ago
2:25 Characterizing and Predicting Early Reviewers for Effective Product Marketing on E Commerce Websites PONDYIT 81 views - 7 years ago
2:02 Ciphertext Policy Attribute Based Signcryption With Verifiable Outsourced Designcryption for Sharing PONDYIT 19 views - 7 years ago
2:21 A Clinical Decision Support Framework for Heterogeneous Data Sources PONDYIT 36 views - 7 years ago
2:44 A Key Policy Attribute Based Temporary Keyword Search scheme for Secure Cloud Storage PONDYIT 40 views - 7 years ago
3:06 An Efficient Method for High Quality and Cohesive Topical Phrase Mining PONDYIT 49 views - 7 years ago
2:36 Analyzing and Detecting Money Laundering Accounts in Online Social Networks PONDYIT 51 views - 7 years ago
2:39 An Efficient and Fair Multi Resource Allocation Mechanism for Heterogeneous Servers PONDYIT 15 views - 7 years ago
3:04 Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras PONDYIT 33 views - 7 years ago
2:50 Aggregation Based Colocation Datacenter Energy Management in Wholesale Markets PONDYIT 17 views - 7 years ago
3:40 A privacy preserving attribute based authentication system for mobile health networks PONDYIT 3 views - 7 years ago
2:55 A Scalable Approach for Content Based Image Retrieval in Peer to Peer Networks PONDYIT 12 views - 7 years ago
2:25 Bayesian Nonparametric Learning for Hierarchical and Sparse Topics PONDYIT 9 views - 7 years ago
2:38 CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics PONDYIT 32 views - 7 years ago
2:56 CoDetect Financial Fraud Detection with Anomaly Feature Detection PONDYIT 62 views - 7 years ago
3:15 Detecting Regions of Maximal Divergence for Spatio Temporal Anomaly Detection PONDYIT 18 views - 7 years ago
3:05 Discovering Canonical Correlations between Topical and Topological Information in Document Networks PONDYIT 8 views - 7 years ago
3:46 Achieving Fairness aware Two level Scheduling for Heterogeneous Distributed Systems PONDYIT 3 views - 7 years ago
2:16 A Secure and Dynamic Multi keyword Ranked search scheme over Encrypted Cloud Data PONDYIT 15 views - 7 years ago
2:17 A Secure and Dynamic Multi keyword Ranked Search Scheme over Encrypted Cloud Data PONDYIT 5 views - 7 years ago
2:46 A secure client side framework for protecting the privacy of health PONDYIT 1 views - 7 years ago
2:59 A big data on private cloud agile provisioning framework based on OpenStack PONDYIT 6 views - 7 years ago
2:37 A brief analysis of the key technologies and applications of educational PONDYIT 5 views - 7 years ago
2:34 Analysis of traffic engineering capabilities for SDN based data center networks PONDYIT 8 views - 7 years ago
3:08 Association rules mining analysis of app usage based on mobile traffic flow data PONDYIT 5 views - 7 years ago
2:48 Audio Visual Speech Enhancement Using Multimodal Deep Convolutional Neural Networks PONDYIT 75 views - 7 years ago
1:20 Big data analysis technology application in agricultural intelligence decision system PONDYIT 22 views - 7 years ago
2:54 Big Data Analytics in Intelligent Transportation Systems A Survey PONDYIT 18 views - 7 years ago
2:05 An Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud Computing PONDYIT 8 views - 7 years ago
1:40 An Efficient Multi User Searchable Encryption Scheme without Query PONDYIT 26 views - 7 years ago
2:51 An Empirical Performance Evaluation of Relational Keyword Search Systems PONDYIT 7 views - 7 years ago
1:59 An Efficient and Privacy Preserving Biometric Identification Scheme PONDYIT 38 views - 7 years ago
2:44 Cloud Based Approximate Constrained Shortest Distance Queries Over Encrypted PONDYIT 7 years ago
2:12 Balancing Performance Accuracy and Precision for secure cloud Transactions PONDYIT 8 views - 7 years ago
3:09 Combining web data extraction and data mining techniques to discover knowledge PONDYIT 10 views - 7 years ago
1:43 Black box Generation of Adversarial Text Sequences to Evade Deep Learning PONDYIT 3 views - 7 years ago