|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Plan generation in a modified blocks world domain by Kothari, Swetha Jain. Material type: Text Publication details: Roorkee Department of Electronics and Computer Engineering 2012Availability: Items available for loan: 1 Call number: 621.38072 KOT.
|
|
|
|
|
|
Distributed query processing on the deep web by Aggrawal, Sunny. Material type: Text Publication details: Roorkee Department of Electronics and Computer Engineering 2012Availability: Items available for loan: 1 Call number: 621.38072.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Framework for network forensic analysis by Shubhakar, Pilli Emmanuel. Material type: Text Publication details: Roorkee Department of Electronics and Computer Engineering 2011Availability: Items available for loan: 1 Call number: 621.38072 SHU.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Chaotic image encyption on GPU by Vihari, P.L.V | Mishra, M. Thesis Detial : M.tech. Material type: Text Publication details: Roorkee Department of Electronics and Computer Engineering 2012Availability: Items available for loan: 1 Call number: 621.38072 VIH.
|
|
|
Data mining based hybrid intrusion classification model by Barot, V | Toshiniwal, D. Thesis Detial : M.tech. Material type: Text Publication details: Roorkee Department of Electronics and Computer Engineering 2012Availability: Items available for loan: 1 Call number: 621.38072 BAR.
|