Computer Security

Big Data Approach to Analytical Chemistry

Big Data Approach to Analytical Chemistry

Extra

Project Report ON Steganography Submitted in partial fulfillment of Master of Computer Application (V Semester Session 2009-2012) Guided By: Submitted By: Lucky…

3 Dimensional Security in Cloud Computing

3 Dimensional Security in Cloud Computing Parikshit Prasad, Badrinath Ojha, *Abhishek Vaish, Rajeev Ranjan shahi, *Utkarsh Goel Ratan Lal Indian Institute of…

Phase II study of gemcitabine and cisplatin in advanced biliary tract cancer

Background:  The aim of this phase II study was to determine the efficacy of gemcitabine plus cisplatin chemotherapy in patients with advanced biliary tract…

Phase II study of gemcitabine and cisplatin in advanced biliary tract cancer

Background:  The aim of this phase II study was to determine the efficacy of gemcitabine plus cisplatin chemotherapy in patients with advanced biliary tract…

Assessment of MANET Routing Protocols in Special Traffic and Mobility Models

Assessment of MANET Routing Protocols in Special Traffic and Mobility Models

Integration of multiple middlewares on a single computing resource

Integration of multiple middlewares on a single computing resource

Next-Generation EU DataGrid Data Management Services

Next-Generation EU DataGrid Data Management Services

Authentication and Authorization Mechanisms for Multi-Domain Grid Environments

This article discusses the authentication and the authorization aspects of security in grid environments spanning multiple administrative domains. Achievements in…
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks