Java

bg
An Efficient Approach for Item Set Mining Using Both Utility and Frequency Based Methods in Java

An Efficient Approach for Item Set Mining Using Both Ut...

An Efficient Approach for Item Set Mining Using Both Utility and Frequency Based...

bg
An Efficient Algorithm for Detecting Influential Nodes in Social Graphs using Network in Java

An Efficient Algorithm for Detecting Influential Nodes ...

An Efficient Algorithm for Detecting Influential Nodes in Social Graphs using Ne...

bg
Achieving Optimal Throughput Utility And Low Delay With CSMA Like Algorithm A Virtual in Java

Achieving Optimal Throughput Utility And Low Delay With...

Achieving Optimal Throughput Utility And Low Delay With CSMA Like Algorithm A Vi...

bg
Achieving High Scalability Through Hybrid Switching in Software Defined Networking in Java

Achieving High Scalability Through Hybrid Switching in ...

Achieving High Scalability Through Hybrid Switching in Software Defined Networki...

bg
Achieving Flatness Selecting the Honeywords from Existing user Passwords in Java

Achieving Flatness Selecting the Honeywords from Existi...

Achieving Flatness Selecting the Honeywords from Existing user Passwords in Java

bg
Achieving Data Privacy Through Secrecy Views and Null Based Virtual in Java

Achieving Data Privacy Through Secrecy Views and Null B...

Achieving Data Privacy Through Secrecy Views and Null Based Virtual in Java

bg
AccountTrade Accountability Against Dishonest Big Data Buyers and Sellers in Java

AccountTrade Accountability Against Dishonest Big Data ...

AccountTrade Accountability Against Dishonest Big Data Buyers and Sellers in Java

bg
Amazon in the White SpaceSocial Recommendation Aided Distributed Spectrum Access in Java

Amazon in the White SpaceSocial Recommendation Aided Di...

Amazon in the White SpaceSocial Recommendation Aided Distributed Spectrum Access...

bg
Aggregated Proof Based Hierarchical Authentication Scheme for Internet of Things in Java

Aggregated Proof Based Hierarchical Authentication Sche...

Aggregated Proof Based Hierarchical Authentication Scheme for Internet of Things...

bg
Advanced License Plate Recognition in Java

Advanced License Plate Recognition in Java

Advanced License Plate Recognition in Java

bg
Adaptive Optimal Stochastic Control of Delay Tolerant Networks in Java

Adaptive Optimal Stochastic Control of Delay Tolerant N...

Adaptive Optimal Stochastic Control of Delay Tolerant Networks in Java

bg
Adaptive Oppotunistic Routing For Wireless Ad Hoc Networks in Java

Adaptive Oppotunistic Routing For Wireless Ad Hoc Netwo...

Adaptive Oppotunistic Routing For Wireless Ad Hoc Networks in Java

bg
Adaptive Multi objective Evolutionary Algorithms for Overtime planning in Software Projects in Java

Adaptive Multi objective Evolutionary Algorithms for Ov...

Adaptive Multi objective Evolutionary Algorithms for Overtime planning in Softwa...

bg
A System to Filter Unwanted Messages From OSN User Walls in Java

A System to Filter Unwanted Messages From OSN User Wall...

A System to Filter Unwanted Messages From OSN User Walls in Java

bg
A Survey of Prediction and Classification Techniques in Multicore Processor Systems in Java

A Survey of Prediction and Classification Techniques in...

A Survey of Prediction and Classification Techniques in Multicore Processor Syst...

bg
A Stable Approach for Routing Queries in Unstructured P2P Networks in Java

A Stable Approach for Routing Queries in Unstructured P...

A Stable Approach for Routing Queries in Unstructured P2P Networks in Java