Your search returned 15 results.

Sort
Results
Scheduling hard real-time periodic tasks with arbitrary deadlines on multiprocessors

by Ahuja, M.S.

Material type: Text Text Publication details: Roorkee Department of Electronics and Computer Engineering 2009Availability: Items available for loan: 1 Call number: 621.38072 AHU.

Parallel svm and pattern based document categorization

by Sharma, V.

Material type: Text Text Publication details: Roorkee Department of Electronics and Computer Engineering 2008Availability: Items available for loan: 1 Call number: 621.38072 SHA.

Update and access frequency based cache replacement policy for ldis

by Jain, P.

Material type: Text Text Publication details: Roorkee Department of Electronics and Computer Engineering 2008Availability: Items available for loan: 1 Call number: 621.38072 JAI.

Design of inference network for information retrieval based on query expansion technique

by Upaman, N.

Material type: Text Text Publication details: Roorkee Department of Electronics and Computer Engineering 2008Availability: Items available for loan: 1 Call number: 621.38072 UPA.

Security analysis of some cryptographic protocols in the generic model of computation

by Aggarwal, M.

Material type: Text Text Publication details: Roorkee Department of Electronics and Computer Engineering 2009Availability: Items available for loan: 1 Call number: 621.38072 AGG.

Secured QoS Routing for MANETs

by Pramanik, Anosooa.

Material type: Text Text Publication details: Roorkee Department of computer science and engineering 2014Availability: Items available for loan: 1 Call number: 621.38072 PRA.

Localization in wireless sensor networks with distance estimation error

by Gour puneet kumar.

Material type: Text Text Publication details: Roorkee Department of Computer Science and Engineering 2014Availability: Items available for loan: 1 Call number: 621.38072 PUN.

Adaptive Steganography using Audio fiies

by Diwakar, Kapil.

Material type: Text Text Publication details: Roorkee Department of Computer Science and Engineering 2014Availability: Items available for loan: 1 Call number: 621.38072 DIW.

Range consistent queries in large databases

by Rizwan, Dudekula.

Material type: Text Text Publication details: India Indian Institute of Technology 2015Availability: Items available for loan: 1 Call number: 004.072 RIZ.

Resource aware scheduling in cloud using clustering technique

by Punjabi, Nirajkumar Sushilbhai.

Material type: Text Text Publication details: India Indian Institute of Technology 2015Availability: Items available for loan: 1 Call number: 004.072 PUN.

Implementing DDOS defense mechanism with software defined networking

by Sudhir, Kumar.

Material type: Text Text Publication details: India Indian Institute of Technology 2015Availability: Items available for loan: 1 Call number: 004.072 SUD.

Snort based hybrid intrusion detection system

by Shrvastava, Roshan Kumar.

Material type: Text Text Publication details: India Indian Institute Technology 2015Availability: Items available for loan: 1 Call number: 004.072 SRI.

Automatic test packet generation

by Tiwari, Hariom.

Material type: Text Text Publication details: India Indian Institute of Technology 2016Availability: Items available for loan: 1 Call number: 004.072 TIW.

Agent base modeling and simulation of financial market

by Sharma, Abhijeet.

Material type: Text Text Publication details: India Indian Institute of Technology 2016Availability: Items available for loan: 1 Call number: 004.072 SHA.

Efficient cooperative caching in disruption tolerant networks

by Sandeep Kumar.

Material type: Text Text Publication details: India Indian Institute of Technology 2016Availability: Items available for loan: 1 Call number: 004.072 SAN.

Pages

Powered by Koha