15 results on '"Um E"'
Search Results
2. Impact Of Code Smells On Software Fault Prediction At Class Level And Method Level
3. Assessment Criteria for Trust Models in Cloud Computing.
4. Comparative Analysis of Access Control Systems on Cloud.
5. Usage Control Model Specification in XACML Policy Language - XACML Policy Engine of UCON.
6. SWAM: Stuxnet Worm Analysis in Metasploit.
7. Technological, Financial and Ecological Analysis of Photovoltaic Power System using RETScreen® : A Case in Khuzdar, Pakistan
8. Adaptive Swarm Intelligence-Based Optimization Approach for Smart Grids Power Dispatch
9. A Review on Fog Computing for the Internet of Things
10. Green campus: Measurements and modeling
11. Detection of noise in high pass IIR digital filters.
12. On-chip gelation of temporally controlled alginate microdroplets
13. Implementation of Dynamic Spectrum Access Using Enhanced Carrier Sense Multiple Access in Cognitive Radio Networks
14. Assessment Criteria for Trust Models in Cloud Computing.
15. SWAM: Stuxnet Worm Analysis in Metasploit.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.