Your selections:
A Fuzzy Inference-Based Decision Support System for Disease Diagnosis
- Alam, Talha Mahboob, Shaukat, Kamran, Khelifi, Adel, Aljuaid, Hanan, Shafqat, Malaika, Ahmed, Usama, Nafees, Sadeem Ahmad, Luo, Suhuai
A lower bound for dilation of an embedding
- Sundara Rajan, R., Manuel, Paul, Rajasingh, Indra, Parthiban, N., Miller, Mirka
- Alam, Talha Mahboob, Shaukat, Kamran, Mahboob, Haris, Sarwar, Muhammad Umer, Iqbal, Farhat, Nasir, Adeel, Hameed, Ibrahim A., Luo, Suhuai
A new construction for linkable secret handshake
- Tian, Yangguang, Li, Yingjiu, Deng, Robert H., Li, Nan, Yang, Guomin, Yang, Zheng
Average distance in interconnection networks via reduction theorems for vertex-weighted graphs
- Klavžar, Sandi, Manuel, Paul, Nadjafi-Arani, M. J., Rajan, R. Sundara, Grigorious, Cyriac, Stephen, Sudeep
Byte2vec: malware representation and feature selection for android
- Yousefi-Azar, Mahmood, Hamey, Len, Varadharajan, Vijay, Chen, Shiping
Corporate Bankruptcy Prediction: An Approach Towards Better Corporate World
- Alam, Talha Mahboob, Shaukat, Kamran, Mushtaq, Mubbashar, Ali, Yasir, Khushi, Matloob, Luo, Suhuai, Wahab, Abdul
Dynamic state-based security architecture for detecting security attacks in virtual machines
- Tupakula, Udaya Kiran, Varadharajan, Vijay
Enforcing role-based access control for secure data storage in the cloud
- Zhou, Lan, Varadharajan, Vijay, Hitchens, Michael
Minimum linear arrangement of incomplete hypercubes
- Miller, Mirka, Sundara Rajan, R., Parthiban, N., Rajasingh, Indra
On the partition dimension of circulant graphs
- Grigorious, Cyriac, Stephen, Sudeep, Rajan, Bharati, Miller, Mirka
Parameterized complexity and biopolymer sequence comparison
- Cai, Liming, Huang, Xiuzhen, Liu, Chunmei, Rosamond, Frances, Song, Yinglei
Rethinking software component security: software component level integrity and cross verification
- Min, Byungho, Varadharajan, Vijay
Server-aided signature verification for lightweight devices
- Guo, Fuchun, Mu, Yi, Susilo, Willy, Varadharajan, Vijay
- Downey, Rodney G., Fellows, Michael R., Langston, Michael A.
The strong connectivity of bubble-sort star graphs
- Wang, Shiying, Wang, Mujiangshan
Trust enhanced security for tenant transactions in the cloud environment
- Tupakula, Udaya, Varadharajan, Vijay
Are you sure you would like to clear your session, including search history and login status?