Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Искусственный интеллект - 004.8
Научные статьи
В разделе "Искусственный интеллект"
A Few Applications of Imprecise Matrices
Fuzzy Agent Oriented Software Effort Estimate with COCOMO
Trust Based Resource Selection in Cloud Computing Using Hybrid Algorithm
Biometric Person Identification System: A Multimodal Approach Employing Spectral Graph Characteristics of Hand Geometry and Palmprint
Detection of Metamorphic Malware based on HMM: A Hierarchical Approach
Proposed Representation Approach Based on Description Logics Formalism
Reliable Mobile Ad-Hoc Network Routing Using Firefly Algorithm
Steganographic Data Hiding using Modified APSO
Automated Forecasting Approach Minimizing Prediction Errors of CPU Availability in Distributed Computing Systems
A Review on Large Scale Graph Processing Using Big Data Based Parallel Programming Models
Using Machine Learning Techniques to Support Group Formation in an Online Collaborative Learning Environment
An Empirical Perspective of Roundtrip Engineering for the Development of Secure Web Application Using UML 2.0
Modeling and Analysis on a DTN Based Wireless Sensor Network Topology Control
Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks
A Model of Workflow-oriented Attributed Based Access Control
The Research of Unconditionally Secure Authentication Code For Multi-Source Network Coding
A Novel Framework to Carry Out Cloud Penetration Test
Searching Methods of MP2P Based on Diffusion Strategy of Resources Index
Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks
Deliberate Secure Grid Computing Blueprint Design in Indian Context
A Robust Image Steganography using DWT Difference Modulation (DWTDM)
A Procedure of Text Steganography Using Indian Regional Language
Methodology for Benchmarking IPsec Gateways
Self Organized Replica Overlay Scheme for P2P Networks
Application of Artificial Neural Network for Clutter Rejection
Security Mechanisms to Decrease Vulnerability of Ad-hoc Routing Protocols
Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks
Generation of An Efficient Digital Watermark Key Based on Honey Comb Polynomial Interpolation Approach
User's Profile Replication Tree and On Demand Replica Update in Wireless Communication
A Novel Routing Scheme for Mobile Ad Hoc Network
Analysis of Reconfigurable Processors Using Petri Net
Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation
Improved Trial Division Technique for Primality Checking in RSA Algorithm
Performance Evaluation of Routing Protocols in Vehicular Networks
An Update based Energy-Efficient Reactive Routing Protocol for Mobile Ad Hoc Networks
Performance Evaluation and Comparison of Network Firewalls under DDoS Attack
An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding
Classification via Clustering for Anonymization Data
Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme
Improved Anonymization Algorithms for Hiding Sensitive Information in Hybrid Information System
← Предыдущая
Следующая страница →
1
|
...
|
5
|
6
|
7
|
8
|
9
|
10
|
11
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.