Content Management using Blockchain |
Saransh Nema |
2019-07-19 00:23:01 |
|
Android System Security Evaluation |
Samir Saurav |
2019-10-31 05:00:34 |
|
IOS Security Evaluation |
Maninder |
2019-08-04 18:54:41 |
|
Impact of Mounting Positions on Data Quality and Human Activity Recognition for Wearable Sensors |
Rohit |
2019-09-26 15:30:42 |
|
Evaluation of Recommender Systems |
ABHILASH |
2019-10-31 05:00:00 |
|
Including DQ indicators into sensor metadata |
Ashish kumar |
2019-10-28 08:30:26 |
|
Privacy protection using k-anonymity for Data Brokers |
Ganesh |
2019-10-28 08:30:26 |
|
Intrusion Detection using Spiking Neural Networks |
Gaurav Budjade |
2019-10-28 08:30:26 |
|
Categorizing Data Sources Based On DQ Indicator |
Krishna |
2019-10-28 08:30:26 |
|
Data Quality Evaluation using Goal Question Metric (GQM) Methodology |
Rahul Navinchand |
2019-10-28 08:30:26 |
|
Generic Tool for Data Quality Evaluation |
Taizun Taiyabi Dalal |
2019-10-28 08:30:26 |
|
Detection of Android Malware based on Signature and Permission Analysis |
Sandhya Murali |
2019-10-28 08:30:26 |
|
Security Evaluation for Android System |
Parinitha Nagaraja |
2019-10-28 08:30:26 |
|
Framework for Automatic Generation of Questions from Text |
Akhil Killawala |
2019-10-28 08:30:26 |
|
SENTITEXT: TWEETS CLASSIFIER |
Akshay Salunke |
2019-10-28 08:30:26 |
|
Impact of Mounting Positions on Data Quality and Human Activity Recognition for Wearable Sensors |
Rohit |
2019-10-28 08:30:26 |
|