International Journal of Science and Research (IJSR)
Computer Science
Downloads: 116 | Views: 472
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2288 - 2293Black Hole Problem in AODV Routing Protocol in MANET
Krunal S Bhavsar | Dr. Kamaljit I Lakhtaria
Downloads: 116 | Views: 489
Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 608 - 612Security for Android Mobile Phones using Biometric Authentication against Factory Reset
Suchita Rane | Dr. Narendra Shekokar
Downloads: 116 | Views: 453
Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 635 - 637Survey Paper on Web Services in IOT
Jyoti L. Khachane | Latika R. Desai
Downloads: 116 | Views: 500
Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 924 - 926An Optimised Key cryptography for Securing Cloud Data Sharing and Storage Environment
Viharika Sudanagunta | K. Narayana Rao
Downloads: 116 | Views: 437
Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 2021 - 2023Survey on Temporal Patterns in Physiological Sensor Data
Nilam
Downloads: 116 | Views: 540
Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 345 - 348Trust Based Energy Efficient Relay Selection in Multihop Wireless Network
Shraddha Patil | Pankaj Chandre
Downloads: 116 | Views: 558
Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 991 - 995Enhanced URMG Method for Automatically Testing Web Applications in the Cloud
Amol K. Rajput | Ajay Kumar Gupta
Downloads: 116 | Views: 388
Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 1069 - 1073Routing Protocols for Wireless Sensor Networks
Chaitanya Mankar | Vidhya Dhamdhere
Downloads: 116 | Views: 485
Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 622 - 624An Efficient Steganography Using Mosaic Image with Enhanced Security
Anisha S | Neethu Maria John
Downloads: 116 | Views: 433
Computer Science & Engineering, China, Volume 5 Issue 2, February 2016
Pages: 733 - 735Computer Network Performance Optimization Approaches based on Distributed System with the Cloud Computing Environment
Song Jiajia