SKIVE ACADEMY
SKIVE ACAMEDY
cubeRandom
block
cubeStop
cubeHide
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Secure and Dynamic Multi-keyword RankedSearch Scheme over Encrypted Cloud Data
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
An Efficient Privacy-Preserving Ranked Keyword Search Method
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
Enabling Cloud Storage Auditing With Key-Exposure Resistance
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
Bucket-Filling An Asymptotically Optimal Video-on-Demand Network With Source Coding
CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services
Cloud-Based Multimedia Content Protection System
Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Dispersing Instant Social Video Service Across Multiple Clouds
DROPS Division and Replication of Data in Cloud for Optimal Performance and Security
Context Based Access Control Systems for Mobile Devices
How Long to Wait Predicting Bus Arrival Time with Mobile Phone Based Participatory Sensing
Context Driven Prescription Based Personal Activity Classification Methodology Architecture and End to End Implementation
Cooperative Positioning and Tracking in Disruption Tolerant Networks
Effective Risk Communication for Android Apps
Generating Summary Risk Scores for Mobile Applications
Collaborative Policy Administration
MOSES Supporting and Enforcing Security Profiles on Smartphones
Anti Theft Application for Android Based Devices
A Two Layered Permission Based Android Malware Detection Scheme
Image Zoom Completion
Super-resolution of Multi-Observed RGB-D Images
Analyzing the Effect of JPEG Compression on Local Variance of Image Intensity
Adaptive Pairing Reversible Watermarking
Multi-view Object Extraction with Fractional Boundaries
Contrast Invariant Interest Point Detection by Zero-Norm LoG Filter
Single Image Super-resolution from Transformed Self-Exemplars
Multiplicative Noise and Blur Removal by Frame let Decomposition and l1-based L-curve Method
Shapes From Pixels
Multi-label Dictionary Learning for Image Annotation
Smart Mirror Usingby Raspberry-Pi
Super-resolution of Multi-Observed RGB-D Images based on Nonlocal Regression and Total Variation
AN EFFICIENT MOBILE PLATFORM FOR WIRELESS SENSOR NETWORK VISUALISATION
A METHOD FOR MODELLING THE BATTERY STATE OF CHARGE IN WIRELESS SENSOR NETWORKS
NETWORKED SWITCHING AND POLYMORPHING CONTROL OF ELECTRICAL LOADS WITH WEB AND WIRELESS SENSOR NETWORKS
DESIGN AND IMPLEMENTATION OF WIRELESS SENSOR NETWORK FOR ROSE GREEN HOUSE MONITORING
DESIGN AND IMPLEMENTATION OF ENERGY EFFICIENT LIGHTING SYSTEM DRIVEN BY WIRELESS SENSOR NETWORKS
SMART HOME FOR ELDERLY CARE, BASED ON WIRELESS SENSOR NETWORK
AN AUTOMATIC IRRIGATION SYSTEM USING ZIGBEE IN WIRELESS SENSOR NETWORK
ZIGBEE BASED IRRIGATION SYSTEM FOR HOME GARDENS
PRAYER SERVICES
LANGUAGES ACADEMY FOR ABROAD
E shopping with billing Management system
Smart Mirror Using Raspberry-Pi Intelligent mirrors, which contin...
The Internet of Things concept has become increasingly popular when it...
Abstract—It is well known that traditional line-commutated converter...
Abstract: This paper describes an alternative to connect power conver...
More videos