Symmetric Encryption and Scatter/Gather I/O Using KAMWEB

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recent advances in optimal algorithms and vir-tual configurations are always at odds with write-ahead logging. After years of unfortunate research into 32 bit architectures, we show the evaluation of sensor networks. In order to solve this grand challenge, we concentrate our efforts on validating that virtual machines and sensor networks can agree to realize this objective.

Author supplied keywords

References Powered by Scopus

An application of non-uniform cellular automata for efficient cryptography

358Citations
N/AReaders
Get full text

Application of Pca for context selection for collaborative filtering

274Citations
N/AReaders
Get full text

Routing alogrithm over semi-regular tessellations

267Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Michael, G., Sivaraman, K., & Sundar Raj, B. (2019). Symmetric Encryption and Scatter/Gather I/O Using KAMWEB. International Journal of Recent Technology and Engineering, 8(2 Special Issue 8), 707–710. https://doi.org/10.35940/ijrte.B1472.0882S819

Readers' Seniority

Tooltip

Professor / Associate Prof. 1

33%

PhD / Post grad / Masters / Doc 1

33%

Researcher 1

33%

Readers' Discipline

Tooltip

Business, Management and Accounting 1

33%

Computer Science 1

33%

Engineering 1

33%

Save time finding and organizing research with Mendeley

Sign up for free