International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 260: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 115 | Views: 557

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2461 - 2464

A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding

Madhuri D. Dhayarkar | Ram B. Joshi

Downloads: 115 | Views: 493

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2533 - 2535

Overview on Effective Controlling Via Store-Carry and Forward Scheme in Mobile Communication

Anusha Varghese | Dr. K Deeba

Downloads: 115 | Views: 616

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2599 - 2603

Iris Image Classification: A Survey

Anjali Hake | Pradeep Patil

Downloads: 115 | Views: 465

Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1289 - 1292

CARV System - Cryptographic Algorithms Representing Visually System

Pyarimol Nair | Neethu Krishnan

Downloads: 115 | Views: 631

Computer Science & Engineering, Tunisia, Volume 4 Issue 2, February 2015

Pages: 1556 - 1558

Modeling of the Behavior of a Robot in a Virtual Environment in 3D

Azizi Ridha | Maaloul Alia

Downloads: 115 | Views: 577

Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 633 - 635

Gesture Authentication via Multi-touch Biometrics

Munshidha.K.K | Anju Augustin

Downloads: 115 | Views: 626

Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1047 - 1050

State- Based Approach to Analyze the Reliability of Component Based Software

Pooja Gupta | Amanpreet Kaur Boparai

Downloads: 115 | Views: 575

Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1899 - 1903

Design of Application to Detect Images Embedded with Malicious Programs

Robert T. R. Shoniwa | Geogen George

Downloads: 115 | Views: 553

Computer Science & Engineering, Sudan, Volume 4 Issue 4, April 2015

Pages: 742 - 748

Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques

Ayad Mohammed Mahyoub Ghaleb | Samani A. Talab

Downloads: 115 | Views: 484

Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 777 - 780

Review on Relevant Top-k Neighbor Search with Keywords

Sonali B. Gosavi | Shyamrao V. Gumaste

Top