International Journal of Science and Research (IJSR)
Computer Science
Downloads: 115 | Views: 504
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1082 - 1086A Comprehensive Analysis of Existing Load Balancing Algorithms in Cloud Network
Pinki | Nida
Downloads: 115 | Views: 504
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1137 - 1140An Efficient Search in Cloud Computing Using Ranked Keyword Search Algorithm
R. Aravind
Downloads: 115 | Views: 562
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1290 - 1294Face Sketch to Photo Matching Using LFDA and Pre-Processing
Pushpa Gopal Ambhore | Lokesh Bijole
Downloads: 115 | Views: 511
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1623 - 1627Weight-based Ontology Pruning using Analysis of Inference Engines for Semantic Web
Kavita D. Pandya | Chirag Pandya
Downloads: 115 | Views: 419
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 772 - 775Knowledge Navigator for Intelligent Collaborative E-Tutoring: A Proposed Framework using Fuzzy Cognitive Agent
Neha Gulati
Downloads: 115 | Views: 442
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 894 - 899Towards the Roadmap of Defect Predictors and its Diagnostics
Shubha Sharma | Anubhooti Papola
Downloads: 115 | Views: 583
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 995 - 998Test Data Generation for Basis Path Testing Using Genetic Algorithm and Clonal Selection Algorithm
Poonam Saini | Sanjay Tyagi
Downloads: 115 | Views: 617
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2409 - 2411Routing in MANET and the Various Threats: A Survey
Anita | Er. Abhilasha
Downloads: 115 | Views: 530
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2526 - 2530A Newly Proposed Light-Weight Technique to Secure Videos
Ronak Dak | Dharm Singh | Naveen Choudhary
Downloads: 115 | Views: 687
Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 344 - 350Detection and Prevention of Fingerprint Altering / Spoofing Based On Pores (Level-3) With The Help of Multimodal Biometrics
Maneesh Kumar Sharma