Information and Communication Technology for Competitive Strategies: Proceedings
215,36 €
Multi-Layer Visual Cryptography with Soft Computing Approach for Authentication. - An Approach to Analyze Behaviour of Network Events in NS2 & NS3 using AWK & Xgraph. - Hybrid Latent Semantic Analysis and Random Indexing Model for Text Summarization.
Jetzt bei Ebay: