International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 200: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 119 | Views: 461

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 538 - 541

A Table Driven Dynamic Load Balancing Scheme for Distributed System

Antim Panghal | A.K Sharma

Downloads: 119 | Views: 453

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1045 - 1051

Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks

Umashri Karkikatti | Dr. Nalini N

Downloads: 119 | Views: 720

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2364 - 2367

A Comprehensive Study of Statistical Machine Translation for English to Kannada Language

Chitra C | Shiva Kumar K M

Downloads: 119 | Views: 613

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2499 - 2504

Review on Load Balancing Techniques in Cloud Computing Environment

Sukhvir Kaur | Supriya Kinger

Downloads: 119 | Views: 541

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2745 - 2750

Supervised Elman Neural Network Architecture for Solving Double Dummy Bridge Problem in Contract Bridge

M Dharmalingam | R Amalraj

Downloads: 119 | Views: 652

Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 232 - 237

Cloud Computing Using Cloud-Level Scheduling: A Survey

Sanket Mani Tiwari

Downloads: 119 | Views: 476

Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 712 - 715

Hierarchical CP-ABE Scheme Implementation on Amazon EC2 Cloud

D. N. Rewadkar | V. S. Dhumal

Downloads: 119 | Views: 438

Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 964 - 968

Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique

Sajjade Zeba-Shazesh | Aruna K. Gupta

Downloads: 119 | Views: 521

Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1797 - 1802

Tracing Visitors Online Behaviors by Using VOB Algorithm for Effective Web Usage Mining

Jyoti Ashokkumar Aidale | Sonali Rangdale

Downloads: 119 | Views: 654

Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2180 - 2186

An Exploration of Web Services and Virtualization Mechanization Fostered In Communication as a Service

Tatenda T. Gotora | Kudakwashe Zvarevashe

Top