3:28 Sensitive and Nonlinear Far Field RF Energy Harvesting in Wireless Communications PONDYIT 12 views - 7 years ago
2:51 An Empirical Performance Evaluation of Relational Keyword Search Systems PONDYIT 7 views - 7 years ago
3:37 On the Security of a Privacy Aware Authentication Scheme for DistributNY TITLE all PONDYIT 2 views - 7 years ago
2:10 Relevant Feedback Based Accurate and Intelligent Retrieval on Capturing User Intention for Personali PONDYIT 12 views - 7 years ago
0:41 Pondy IT Soft Solution Company puducherry- pondicherry -pondy-tamil nadu- india PRIYA P 717 views - 14 years ago
2:18 Perceptual Adversarial Networks for Image to Image Transformation PONDYIT 27 views - 7 years ago
3:06 An Efficient Method for High Quality and Cohesive Topical Phrase Mining PONDYIT 49 views - 7 years ago
2:34 Lightweight Fine Grained Search over Encrypted Data in Fog Computing PONDYIT 10 views - 7 years ago
1:24 A Robust Load Balancing and Routing Protocol for Intra Car Hybrid Wired Wireless Networks PONDYIT 6 views - 7 years ago
4:09 Performance Analysis of Cooperative Multicell Precoding With Global CSI and Local Individual CSI in PONDYIT 4 views - 7 years ago
1:24 Data driven network analytics and network optimisation in SDN based programmable optical networks PONDYIT 5 views - 7 years ago
1:45 A Data Parasitizing Scheme for Effective Health Monitoring in Wireless Body Area Networks PONDYIT 4 views - 7 years ago
1:18 On the challenges in Designing Identity based privacy preserving Authentication schemes for Mobile D PONDYIT 1 views - 7 years ago
1:38 Identifying Onsite Users for Social Events Mobility, Content, and Social Relationship PONDYIT 31 views - 7 years ago