Skip to main content
Skip to footer
Search
Connect
chennaisunday.tn
@chennaisunday.tn
1
follower
Follow
Videos
Playlists
Most recent
Most recent
Most viewed
7:41
Robust watermarking Of Compressed And Encrypted Jpeg2000 Images
13 years ago
6:31
Query Access Assurance In Outsourced Databases
13 years ago
4:04
Query Delay And Data Availability In MANETs
13 years ago
7:05
Preserving Integrity Of Data Public And Auditing For Data Storage Security In Cloud Computing
13 years ago
8:22
Organizing User Search History
13 years ago
5:21
Optimal Power Allocation In Multi-Relay MIMO Cooperative Networks Theory and Algorithms
13 years ago
3:40
Network Assisted Mobile Computing with Optimal Uplink
13 years ago
8:34
Joint Top-K Spatial Keyword Query Processing
13 years ago
6:40
View Invarient Action Recognition Based On Artificial Neural Networks
13 years ago
7:48
Mining Web Graphs For Recommendations
13 years ago
4:10
User Aware Image Tag Refinement Via Ternary Semantic Analysis
13 years ago
3:31
TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS
13 years ago
8:56
Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
13 years ago
5:10
Scalable Scheduling Of Updates In Streaming Data Warehouses
13 years ago
5:59
Scalable Learning Of Collective Behavior
13 years ago
5:10
Scalable Scheduling Of Updates In Streaming Data Warehouses
13 years ago
7:04
Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute Based Encryption
13 years ago
5:39
Robust Face-Name Graph Matching For Movie Character Identification
13 years ago
7:01
ROAuth Recommendation Based Open Authorization
13 years ago
4:25
Resource-Aware Application State Monitoring
13 years ago
5:08
Ranking Model Adaption For Domain Specific Search
13 years ago
7:42
Query Planning For Continuous Aggregation
13 years ago
4:04
Query Delay And Data Availability In MANETs
13 years ago
6:09
Protecting Location Privacy In Sensor Networks Against A Global Eavesdropper
13 years ago
7:52
Privacy Preserving Delegated Access Control
13 years ago
14:24
Packet Hiding Methods For Preventing Selactive Jamming Attacks
13 years ago
11:03
Outsourced Similarity Search On Metric Data Assets
13 years ago
4:52
Investigation And Analysis Of New Approach Of Intelligent Semantic Web Search Engine
13 years ago
8:36
OAuth Web Authorization Protocol
13 years ago
3:15
Measuring Code Quality To Improve Specification Mining
13 years ago