International Journal of Science and Research (IJSR)
Computer Science
Downloads: 124 | Views: 635
Computer Science & Engineering, India, Volume 2 Issue 12, December 2013
Pages: 456 - 459Clustering Techniques for Network lifetime Improvement: A Survey
Sanjay Madaan | Dinesh Kumar | Robin
Downloads: 124 | Views: 685
Computer Science & Engineering, India, Volume 3 Issue 1, January 2014
Pages: 39 - 41Evaluation of Similarities Measure in Document Clustering
Hemalatha Immandhi
Downloads: 124 | Views: 553
Computer Science & Engineering, India, Volume 3 Issue 1, January 2014
Pages: 257 - 259A Simulation of the Fundamental Attributes of Autonomous Computing
Sugandh Shah | Hatib Zeeshan
Downloads: 124 | Views: 787
Computer Science & Engineering, India, Volume 3 Issue 2, February 2014
Pages: 79 - 82Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography
D. Pradeepa | S. Rani Lakshmi
Downloads: 124 | Views: 705
Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 41 - 44Multi Owner Data Sharing with Privacy Preserving in Cloud Security Mediator
J. Suba | Seenivasan
Downloads: 124 | Views: 516
Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 373 - 376Host Based Intrusion Detection to Prevent Virtual Network System from Intruders in Cloud
J. Sasi Devi | R. Sugumar
Downloads: 124 | Views: 804
Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 154 - 158Hand Gesture Recognition From Video
Priya Gairola | Sanjay Kumar
Downloads: 124 | Views: 715
Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 159 - 163Intelligent Fuzzy Type-Ahead Search in XML Data
Supriya Chaudhari | Vaishali Deshmukh
Downloads: 124 | Views: 607
Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 308 - 311Data Anonymization Approaches for Data Sets Using Map Reduce on Cloud: A Survey
Veena | Devidas
Downloads: 124 | Views: 477
Computer Science & Engineering, Saudi Arabia, Volume 3 Issue 4, April 2014
Pages: 375 - 380Security in Routing Protocol for Ad Hoc Networks
Abu Taha Zamani | Syed Zubair