International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 169: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 122 | Views: 607

Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1905 - 1910

Detecting and Avoiding Sybil Attack in OLSR Protocol

Amit Kumar | Varun Singla

Downloads: 122 | Views: 528

Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2009 - 2011

Survey on Web Image Re-Ranking Using Query-Specific Semantic Signatures

Vandana Ramchandra Nangare

Downloads: 122 | Views: 686

Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2620 - 2623

Comparative Study and Evaluation of Solving Sybil Attack on Peer-To-Peer Network

Anju Shukla | Prachi Damodhar Shahare

Downloads: 122 | Views: 481

Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 638 - 642

Effective and Optimized Software Reliability Prediction

Meenakshi Malik | Garima Garg

Downloads: 122 | Views: 487

Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 785 - 788

Geometric Reconstructions in Video Inpainting

Pooja Nandeshwar | V.S. Nandedkar

Downloads: 122 | Views: 534

Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 998 - 1001

A Survey on Detection of Diabetic Retinopathy and Glaucoma from Fundus Images

Pavithra | Dr. N. Shanthi

Downloads: 122 | Views: 590

Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1619 - 1622

Gray Hole Detection and Removal in MANET by Pool Tile Method

Supriya Pustake | Dr. S. J. Wagh | D. C. Mehetre

Downloads: 122 | Views: 530

Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 2141 - 2143

Duplication Removal and Auditing Check Over Cloud

Pranita B. Wadavkar | Prashant M. Mane

Downloads: 122 | Views: 543

Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1316 - 1319

Host Identity Protocol for End-to-End Security in IoT

Huda Mulani | Aruna Gawade

Downloads: 122 | Views: 569

Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1317 - 1320

Effective Handling of Reputation-Based Trust Management in Cloud Environment

Sonali Jivan Nikam | Dr. S. N. Kini

Top