Digital Library


Search: "[ author: P ]" (306)

  1. [Editorial] Advanced Technologies and Applications for Security and Multimedia Computing

  2. Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions

  3. Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance

  4. Mitigating Threats and Security Metrics in Cloud Computing

  5. An Improved Algorithm for Redundancy Detection Using Global Value Numbering

  6. A Comprehensive Review of Emerging Computational Methods for Gene Identification

  7. Seamless Mobility of Heterogeneous Networks Based on Markov Decision Process

  8. Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam

  9. Event Detection on Motion Activities Using a Dynamic Grid

  10. Comparative Study of Various Persian Stemmers in the Field of Information Retrieval