IMPLEMENTATION OF LEARNING EVALUATING ANALYZING RANKING AND NURTURING TOOL
Abstract
Keywords
Full Text:
PDFReferences
R. Kohavl and R. Longbotham. (2007). “Lessons Learned”, accessed on Jul. 2015. [Online]. Available: http://exp-platform. com/Documents/IEEEComputer2007OnlineExperiments.pdf
Becker, G.T., Strobel, D., Paar, C. and Burleson, W. (2012) “Detecting software theft in embedded systems: a side-channel approach”. IEEE Trans. Inform. Forensics Secur., 7, 1144–1154.
Davis, lan., and Michael w.godfrey. "From Whence It Came: Detecting Source Code Clones by Analyzing Assembler", 2010 17th Working Conference on Reverse Engineering, 2010.
Z. Wu, M. Butkiewicz, D. Perkins, E. Katz-Bassett, and H. V. Madhyastha, “SPANStore: Cost-effective geo-replicated storage spanning multiple cloud services,” in Proc. SOSP, pp. 292–308, Nov. 2013.
Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weatherspoon, “A Case For Cloud Storage Diversity”, Apr 2010.
Ramakrishna Kotla, Lorenzo Alvisi, and Mike Dahlin, “SafeStore: A Durable and Practical Storage System", Jan 2007.
Suresh Kuri1, V.B.Deshmukh, Dr.
G.H.Kulkarni,”Robust digital image watermark uding pseudo random numbers”, 2012
DOI: https://doi.org/10.26483/ijarcs.v9i2.5662
Refbacks
- There are currently no refbacks.
Copyright (c) 2018 International Journal of Advanced Research in Computer Science

