373 results
Search Results
2. Exploring Image Transformations with Diffusion Models: A Survey of Applications and Implementation Code
3. An Overview of Data Security Algorithms in Cloud Computing
4. The Impact of Information Technologies on the Tourist Experience: Case of Tabasco, Mexico
5. The Potential of Education and Training in Additive Manufacturing
6. Anomaly Detection Using Machine Learning Techniques: A Systematic Review
7. The Use of Mobile Technology in Outdoor Tourism: A Systematic Review
8. Technological Accessibility Plan for Students with Disabilities: An Experience in Inclusive Education
9. BCSChain: Blockchain-Based Ceramic Supply Chain
10. The Future of Software Engineering: Where Will Machine Learning, Agile, and Virtualization Take Us Next?
11. CBCT: CryptoCurrency Based Blockchain Technology
12. Smart Dust in the Industrial Economic Sector – On Application Cases in Product Lifecycle Management
13. Idea: Ancient Greek Science and Technology
14. Distributed Ledger and Robust Consensus for Agreements
15. Study on the Internet of Things from Applications to Security Issues
16. Optimizing Fusion PIC Code Performance at Scale on Cori Phase Two
17. Visualizing Performance Data with Respect to the Simulated Geometry
18. Visual Cryptography : Models, Issues, Applications and New Directions
19. A GPSR Enhancement Mechanism for Routing in VANETs
20. The Effect on School Operations of the Use of School Management Software in Victoria
21. SUMO in Scientific Literature, 2002–2012
22. Programming P Systems with Complex Objects
23. On the Application of Answer Set Programming to the Conference Paper Assignment Problem
24. Architecting Infrastructures for Cloud-Enabled Mobile Devices
25. Experience with the Children-Humanoid Interaction in Rehabilitation Therapy for Spinal Disorders
26. Identities for Embedded Systems Enabled by Physical Unclonable Functions
27. Students’ Perspectives on Utility of Mobile Applications in Higher Education
28. e-Business Challenges and Directions: Important Themes from the First ICE-B Workshop
29. A Conundrum of Permissions: Installing Applications on an Android Smartphone
30. Augmenting User Models with Real World Experiences to Enhance Personalization and Adaptation
31. IP Satellite Services and Applications Evolution towards the Future Internet
32. Progress of China Agricultural Information Technology Research and Applications Based on Registered Agricultural Software Packages
33. A Lightweight Method for the Modelling of Enterprise Architectures
34. Introduction to Self-adaptive Software: Applications
35. Web Personalisation for Users Protection: A Multi-agent Method
36. An Overview of Artificial Intelligence Applications in Cybersecurity Domains
37. Converging Affective Computing and Ethical Challenges: The Quest for Universal Access in Human-Machine Cooperation
38. Results of the Second International Workshop on Self-adaptive Software
39. Split-and-Delegate: Threshold Cryptography for the Masses
40. Genetic algorithms for genetic mapping
41. Application of evolutionary algorithms to protein folding prediction
42. An agent system for learning profiles in broadcasting applications on the Internet
43. Evolving Turing machines from examples
44. Inverse problems for finite automata: A solution based on genetic algorithms
45. Update programs versus revision programs
46. An abductive proof procedure for reasoning about actions in modal logic programming
47. Update-programms can update programs
48. A classification system for credit card transactions
49. Telephone network traffic overloading diagnosis and evolutionary computation techniques
50. FAM on grain scheduling control of highly nonlinear and disturbed processes
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.