International Journal of Science and Research (IJSR)
Computer Science
Downloads: 115 | Views: 609
Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 70 - 73Detection and Mitigation Techniques of Black Hole Attack in MANET: An Overview
Swati Jain | Naveen Hemrajani
Downloads: 115 | Views: 608
Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 176 - 179TESTING OF WEB APPLICATIONS BASED ON MODEL DRIVEN ARCHITECTURE
Harsimrat Kaur | Janpreet Sigh
Downloads: 115 | Views: 611
Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 394 - 397Implementation of Non Shannon Entropy Measures for Color Image Segmentation And Comparison With Shannon Entropy Measures
Vijayshree Gautam | Kamlesh Lakhwani
Downloads: 115 | Views: 589
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 320 - 323A Trivial And Consistent Routing With In-Network Aggregation In Wireless Sensor Networks
C.Pravallika | T.Venkata Naga Jayudu
Downloads: 115 | Views: 600
Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 372 - 376Modeling Local Broker Policy Based on Workload Profile in Network Cloud
Amandeep Sandhu | Maninder Kaur
Downloads: 115 | Views: 667
Computer Science & Engineering, India, Volume 2 Issue 11, November 2013
Pages: 408 - 411Fingerprint Identification using Fusion of Pores and Minutiae Extraction at different Resolutions
Mahak Arora | Veenu Sharma
Downloads: 115 | Views: 543
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 739 - 743Use of Mobile Relay in Data-Intensive Wireless Sensor Networks
Jyothi B. | G. Srinivasachar
Downloads: 115 | Views: 554
Computer Science & Engineering, Ghana, Volume 3 Issue 5, May 2014
Pages: 844 - 848Analysis and Design of Green IT in Society Performance
Sudhakar Murugesan | Seenuvasan Arumugam
Downloads: 115 | Views: 576
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 889 - 891Advanced Approach for Image Fusion Using Filtering methods
Vishnu R | Jijina K P
Downloads: 115 | Views: 508
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 963 - 966Quantum Mechanics and Cryptography
Shiv Kumar | Shrawan Kumar | Bimlendu Verma