International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 152: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 123 | Views: 600

Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 216 - 221

Rudiments of Cloud to Green Cloud: Smartness in Power Redeeming

Gaganpreet Kaur Sehdev

Downloads: 123 | Views: 537

Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 286 - 291

Fast and Accurate Incremental Entity Relationships

Rajeshkumar S | Geofrin Shirly S

Downloads: 123 | Views: 517

Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 369 - 372

Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception

Neelutpol Gogoi | M. N. Sushmitha

Downloads: 123 | Views: 459

Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 432 - 435

Minimizing Packet Loss Using Congestion Control Scheme for Video Streaming

A. ThamaraiSelvan | R. Sethu Raman

Downloads: 123 | Views: 658

Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 253 - 257

Outlier Recognition in Clustering

Balaram Krishna Chavali | Sudheer Kumar Kotha

Downloads: 123 | Views: 547

Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 391 - 397

Discrete Wavelet Transform (DWT) with Two Channel Filter Bank and Decoding in Image Texture Analysis

Akash Goel

Downloads: 123 | Views: 455

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1208 - 1212

Impact and Analysis of Improved Bilateral Filter on TEM Images

Garima Goyal

Downloads: 123 | Views: 537

Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 411 - 413

Scalable and Secure Sharing of Personal Health records in Cloud Computing Using Attribute Based Encryption

Y. B. Gurav | Manjiri Deshmukh

Downloads: 123 | Views: 626

Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1999 - 2003

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Suchita S. Potdar | Dr. Mallikarjun

Downloads: 123 | Views: 456

Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1285 - 1288

Online Anomaly Detection under Over-sampling PCA

Y Srilakshmi | D Ratna Kishore

Top