International Journal of Science and Research (IJSR)
Computer Science
Downloads: 115 | Views: 642
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1328 - 1330Comparative Analysis of HBase Data Storage Model and RDBMS for Location based Application
Chandrakant Nitnaware | Amreen Khan
Downloads: 115 | Views: 536
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2493 - 2496Position Based Routing protocols in VANET for Better Link Quality: A Survey
Ankita Soni | Deepak Kumar Xaxa
Downloads: 115 | Views: 409
Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1000 - 1004Review on Detection of Clone Attacks inWireless Sensor Networks
Nikita R. Kitey | Dr. M. S. Ali
Downloads: 115 | Views: 454
Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1937 - 1942Achieving Data Confidentiality and Authentication in Cloud Computing
Abhilash S Nath | Reshna T
Downloads: 115 | Views: 541
Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2152 - 2156Inferring user Search Goals with Feedback Sessions using STC
Asha P | Ambily Balaram
Downloads: 115 | Views: 622
Computer Science & Engineering, Saudi Arabia, Volume 4 Issue 6, June 2015
Pages: 345 - 349Design System for Discrimination Patterns Geometric Shapes using Neural Networks (Hamming @ Max net)
Dr. Magdi Mohammed Mohammed Ahmed Hamoda
Downloads: 115 | Views: 588
Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 788 - 789Impact of Data Warehouse in Decision Making Process
Abhishek Dabas | Vandana Dabass | Heena Mehta
Downloads: 115 | Views: 732
Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 823 - 827Association Rule Mining with Fuzzy Logic: an Overview
Anand V. Saurkar | S. A. Gode
Downloads: 115 | Views: 641
Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 834 - 837Optimization of Image Compression Technique: Huffman Coding by Using PCDA
Rakhi Seth | Sanjivani Shantaiya
Downloads: 115 | Views: 529
Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 842 - 846An Efficient Technique of Steganography
Latika | Yogita Gulati