×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
jaideep documents
Documents
[IEEE 2010 IEEE International Conference on Data Mining Workshops (ICDMW) - Sydney, TBD, Australia (2010.12.13-2010.12.13)] 2010 IEEE International Conference on Data Mining Workshops
Documents
[ACM Press the 2013 IEEE/ACM International Conference - Niagara, Ontario, Canada (2013.08.25-2013.08.28)] Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social
Documents
An endoclip for life?
Documents
Public Health and Poor Law
Documents
ASYLUM REPORTS
Documents
Contents
Documents
Tu1828 Use of Inflammatory Cytokines and Adipokines for Risk Stratification in Severe Acute Alcoholic Hepatitis
Documents
748 Cirrhosis Patients Have High Hospital Readmission Rates
Documents
Somatostatin type-2 receptor activation inhibits glutamate release and prevents status epilepticus
Documents
[IEEE 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Atlanta, GA, USA (2013.11.17-2013.11.20)] 2013 IEEE/WIC/ACM
Documents
[IEEE 2011 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2011) - Kaohsiung City, Taiwan (2011.07.25-2011.07.27)] 2011 International Conference
Documents
[IEEE 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom) - Boston, MA, USA (2011.10.9-2011.10.11)]
Documents
The myth of interconnected plastids and related phenomena
Documents
[ACM Press the 12th ACM symposium - Sophia Antipolis, France (2007.06.20-2007.06.22)] Proceedings of the 12th ACM symposium on Access control models and technologies - SACMAT '07 -
Documents
The relationship between organizational slack and innovation: revisited
Documents
[Lecture Notes in Computer Science] Computer Security - ESORICS 2014 Volume 8712 || Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution
Documents
[Lecture Notes in Computer Science] Computer Security - ESORICS 2014 Volume 8712 || Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data
Documents
Distributed task scheduling and human resource distribution in industrial service solution production: a simulation application
Documents
A methodology for assessing time‐based competitive advantage of manufacturing firms
Documents
[Lecture Notes in Computer Science] Computer Security - ESORICS 2014 Volume 8713 || Botyacc: Unified P2P Botnet Detection Using Behavioural Analysis and Graph Analysis
Documents
Proceedings of the 2006 SIAM International Conference on Data Mining || Health monitoring of a shaft transmission system via hybrid models of PCR and PLS
< Prev
Next >