International Journal of Science and Research (IJSR)
Computer Science
Downloads: 129 | Views: 616
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1555 - 1558Universal Database Integration System
Jaya Chandna | Dr. Ritu Sindhu
Downloads: 129 | Views: 601
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 389 - 391KNN Classification of Encrypted Cloud Data with Privacy Preservation
Mayadevee Madhukar Kotlapure | L. J. Sankpal
Downloads: 129 | Views: 578
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 408 - 412A Secure Image Steganography Using Bit Shift Encryption & MLSB Approach
Raminder Jit Singh Kahlon | Vinay Bhardwaj
Downloads: 129 | Views: 656
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 529 - 532Effective Video Streaming over MANET: A Cross Layered Approach
S. Madhu | Dr. M. Bal Raju | Dr. P. Chenna Reddy
Downloads: 129 | Views: 460
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 848 - 851Pros and Cons of Cloud Computing Technology
Sandeep Mukherji | Shashwat Srivastava
Downloads: 129 | Views: 614
Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 988 - 990Overview on Unsupervised Mining Feebly Named Web Facial Pictures for Hunt Based Face Comment
Tejaswini B Patil | Sneha Bhat
Downloads: 129 | Views: 433
Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 991 - 996Study on the Fundamentals of Machine Learning Approach
Zeinab Samdaliri
Downloads: 129 | Views: 527
Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 798 - 804Generating Captions for News Domain using Randomization Technique
Kalyani Zinjurde | Ena Jain
Downloads: 129 | Views: 499
Computer Science & Engineering, India, Volume 5 Issue 12, December 2016
Pages: 428 - 430NeoLoad: Comprehensive Mobile Performance Testing
Chetan Nimba Aher | Chaitali Subhash Borse
Downloads: 129 | Views: 583
Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 340 - 345To Evaluate the Performance of Security Mechanism through LEACH and THVRG in WSN
Priyanka Sharma