Search
Now showing items 1-10 of 10
“Role of metadata in forensic analysis of database attacks“
Publisher: IEEE
Year: 2014
Performance analysis of IEEE 802.11E under Binomial Backoff Algorithm
Publisher: IEEE
Year: 2014
Anti-theft application for android based devices
Publisher: IEEE
Year: 2014
Improving Visual Communication for EIT-Based Lung Research
Publisher: IEEE
Year: 2014
Divide the Task, Multiply the Outcome: Cooperative VM Consolidation
Publisher: IEEE
Year: 2014
Time-time-transform application to fault diagnosis of power transformers
Publisher: IET
Year: 2014
Two-Level Storage QoS to Manage Performance for Multiple Tenants with Multiple Workloads
Publisher: IEEE
Year: 2014
Executing Bag of Distributed Tasks on the Cloud: Investigating the Trade-Offs between Performance and Cost
Publisher: IEEE
Year: 2014