Zobrazeno 1 - 10
of 46
pro vyhledávání: '"S. Jeyalaksshmi"'
Publikováno v:
In Sustainable Computing: Informatics and Systems January 2024 41
Autor:
S. Radha, S. Jeyalaksshmi
Publikováno v:
2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS).
Autor:
S. Punithavathi, S. Jeyalaksshmi
Publikováno v:
2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS).
Autor:
J. Gajavalli, S. Jeyalaksshmi
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811948626
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::25995534399f20b9af7dcbdf69a8d456
https://doi.org/10.1007/978-981-19-4863-3_50
https://doi.org/10.1007/978-981-19-4863-3_50
Autor:
S. Jeyalaksshmi, P. J. Sai Vignesh
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811948626
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::679a0ac492a60aa061788c3e739884aa
https://doi.org/10.1007/978-981-19-4863-3_51
https://doi.org/10.1007/978-981-19-4863-3_51
Publikováno v:
Multi-Criteria Decision Models in Software Reliability ISBN: 9780367816414
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0916f42651bc0fc0f00991f5bcb2a812
https://doi.org/10.1201/9780367816414-2
https://doi.org/10.1201/9780367816414-2
Autor:
S. Jeyalaksshmi, Raja.M Ganesh
Publikováno v:
2022 International Conference on Computing, Communication and Power Technology (IC3P).
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM).
While the placement of the Virtual Computer was It remains an open challenge for Volunteer Cloud Computing, which reveals many divergent gaps in conventional cloud computing contexts, and has been thoroughly studied. Features, including sporadic usab
Publikováno v:
2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM).
For long ago, biometric authentication has been performed for high-security applications like bank lockers, private places. Here studies made on the physiological attributes of an individual can be represented with his finger print, iris, etc. Among