International Journal of Science and Research (IJSR)
Computer Science
Downloads: 122 | Views: 607
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1905 - 1910Detecting and Avoiding Sybil Attack in OLSR Protocol
Amit Kumar | Varun Singla
Downloads: 122 | Views: 528
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2009 - 2011Survey on Web Image Re-Ranking Using Query-Specific Semantic Signatures
Vandana Ramchandra Nangare
Downloads: 122 | Views: 686
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2620 - 2623Comparative Study and Evaluation of Solving Sybil Attack on Peer-To-Peer Network
Anju Shukla | Prachi Damodhar Shahare
Downloads: 122 | Views: 481
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 638 - 642Effective and Optimized Software Reliability Prediction
Meenakshi Malik | Garima Garg
Downloads: 122 | Views: 487
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 785 - 788Geometric Reconstructions in Video Inpainting
Pooja Nandeshwar | V.S. Nandedkar
Downloads: 122 | Views: 534
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 998 - 1001A Survey on Detection of Diabetic Retinopathy and Glaucoma from Fundus Images
Pavithra | Dr. N. Shanthi
Downloads: 122 | Views: 590
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1619 - 1622Gray Hole Detection and Removal in MANET by Pool Tile Method
Supriya Pustake | Dr. S. J. Wagh | D. C. Mehetre
Downloads: 122 | Views: 530
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 2141 - 2143Duplication Removal and Auditing Check Over Cloud
Pranita B. Wadavkar | Prashant M. Mane
Downloads: 122 | Views: 543
Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1316 - 1319Host Identity Protocol for End-to-End Security in IoT
Huda Mulani | Aruna Gawade
Downloads: 122 | Views: 569
Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 1317 - 1320Effective Handling of Reputation-Based Trust Management in Cloud Environment
Sonali Jivan Nikam | Dr. S. N. Kini