Multiprocessor scheduling of dependent tasks to minimize makespan and reliability cost using nsga ii
Evaluation Of The Data Security Methods In Cloud Computing Environments
Real time human-computer interaction
Health Care Monitoring for the CVD Detection using Soft Computing Techniques
Protect mobile agent against malicious host using partial mobility mechanism
A Novel Metaheuristics To Solve Mixed Shop Scheduling Problems
HIDDEN MARKOV MODEL BASED NAMED ENTITY RECOGNITION TOOL
Particle swarm optimized power
Robust 3 d face recognition in presence of
Pronominal anaphora resolution in
Secure multipath routing scheme using key
Providing a model for selecting information security control objectives using fuzzy screening technique with a
A hybrid fuzzy ann approach for software effort estimation
A new approach to analyze visual secret sharing schemes for biometric authentication a survey
Business and technical requirements of software as-a-service implications in portuguese enterprise business context
A framework for the evaluation of saas
OPTIMIZATION OF CROSS DOMAIN SENTIMENT ANALYSIS USING SENTIWORDNET
Mining of product reviews at aspect level
Real time eventual consistency
DEVNAGARI NUMERALS CLASSIFICATION AND RECOGNITION USING AN INTEGRATED APPROACH