Search Results - (( program learning encryption algorithm ) OR ( java applications usage algorithm ))
Search alternatives:
- learning encryption »
- applications usage »
- java applications »
- program learning »
- usage algorithm »
-
1
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…Hence, the fragmented CMS encryption algorithm will solve this problem and the errors in the message will be removed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
4
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
