Author:
Durga Nagarjuna T.,Anil Kumar T.,Santha Sheela A. C.
Reference22 articles.
1. Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, K. Ren, A privacy preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)
2. T.P. Jacob, T. Ravi, An optimal technique for reducing the effort of regression test. Indian J. Sci. Technol. 6(8), 5065–5069 (2013)
3. D. Narmadha, A. Pravin, An intelligent computer-aided approach for target protein prediction in infectious diseases. Soft Comput. 1–14 (2020)
4. J.S. Plank, T1: erasure codes for storage applications, in Proceedings of 4th USENIX Conference on File Storage Technology (2005), pp. 1–74
5. R. Kulkarni, A. Forster, G. Venayagamoorthy, Computational intelligence in wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 13(1), 68–96 (First Quarter 2011)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献