| Content Management using Blockchain |
Saransh Nema |
2019-07-19 00:23:01 |
|
| Android System Security Evaluation |
Samir Saurav |
2019-10-31 05:00:34 |
|
| IOS Security Evaluation |
Maninder |
2019-08-04 18:54:41 |
|
| Impact of Mounting Positions on Data Quality and Human Activity Recognition for Wearable Sensors |
Rohit |
2019-09-26 15:30:42 |
|
| Evaluation of Recommender Systems |
ABHILASH |
2019-10-31 05:00:00 |
|
| Including DQ indicators into sensor metadata |
Ashish kumar |
2019-10-28 08:30:26 |
|
| Privacy protection using k-anonymity for Data Brokers |
Ganesh |
2019-10-28 08:30:26 |
|
| Intrusion Detection using Spiking Neural Networks |
Gaurav Budjade |
2019-10-28 08:30:26 |
|
| Categorizing Data Sources Based On DQ Indicator |
Krishna |
2019-10-28 08:30:26 |
|
| Data Quality Evaluation using Goal Question Metric (GQM) Methodology |
Rahul Navinchand |
2019-10-28 08:30:26 |
|
| Generic Tool for Data Quality Evaluation |
Taizun Taiyabi Dalal |
2019-10-28 08:30:26 |
|
| Detection of Android Malware based on Signature and Permission Analysis |
Sandhya Murali |
2019-10-28 08:30:26 |
|
| Security Evaluation for Android System |
Parinitha Nagaraja |
2019-10-28 08:30:26 |
|
| Framework for Automatic Generation of Questions from Text |
Akhil Killawala |
2019-10-28 08:30:26 |
|
| SENTITEXT: TWEETS CLASSIFIER |
Akshay Salunke |
2019-10-28 08:30:26 |
|
| Impact of Mounting Positions on Data Quality and Human Activity Recognition for Wearable Sensors |
Rohit |
2019-10-28 08:30:26 |
|