This access is for Demo Purpose only

rgpv search form
Total Articles: 11081
Title Subject Article Journal
Recommendation Algorithm Using Clustering-Based UPCSim (CB-UPCSim) Computer Engineering
Analytical and Numerical Evaluation of Co-Scheduling Strategies and Their Application Computer Engineering
Fraud Detection Using the Fraud Triangle Theory and Data Mining Techniques: A Literature Review Computer Engineering
Blockchain Software Selection as a Fuzzy Multi-Criteria Problem Computer Engineering
A Novel Simulation Platform for Underwater Data Muling Communications Using Autonomous Underwater Vehicles Computer Engineering
360°-Based Virtual Field Trips to Waterworks in Higher Education Computer Engineering
Feature Focus: Towards Explainable and Transparent Deep Face Morphing Attack Detectors Computer Engineering
Smart Interconnected Infrastructures for Security and Protection: The DESMOS Project Computer Engineering
An Experimental Study on Centrality Measures Using Clustering Computer Engineering
Privacy Preservation Instruments Influencing the Trustworthiness of e-Government Services Computer Engineering

 

Outlaw Books: NYC, USA

August 12th, 2018 - 9:30 PM